نتایج جستجو برای: confidential self

تعداد نتایج: 531047  

2015
SHEN NOETHER

This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is cryptocurrency which is distributed through a proof of work “mining” process. The original Monero protocol was based on CryptoNote, which uses Ring Signatures and one-time keys to hide the destination and origin of transactions. Recently the...

Journal: :CoRR 2006
Yingbin Liang H. Vincent Poor

Abstract— A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the multiple access channel (MAC) in that the two users also receive channel outputs. It is assume...

Journal: :SSRN Electronic Journal 2002

2006
Nir Oren Timothy J. Norman Alun D. Preece

While researchers have looked at many aspects of argumentation, an area often neglected is that of argumentation strategies. That is, given multiple possible arguments that an agent can put forth, which should be selected in what circumstances. In this paper, we propose a heuristic that implements one such strategy. The heuristic assigns a utility cost to revealing information, as well as a uti...

2009

Annex 8 to pay TV phase three document This is the non-confidential version. Confidential information has been redacted. Redactions are indicated by []. Annex 8 to pay TV phase three document – Assessment of market power – non-confidential version

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - پژوهشکده ادبیات 1392

abstract the aim of the present study is to explore the impact of the cognitive reading strategy instruction on learners reading self-efficacy and their reading achievement. in order to fulfill this purpose, from 120 participants, 90 intermediate efl learners as an experimental group were chosen from three different educational settings namely, yazd university, yazd science and art un...

Journal: :Archives of disease in childhood 2003
A M Weindling

T he Confidential Enquiry into Maternal and Child Health (CEMACH) was established in April 2003. It replaces CESDI (the Confidential Enquiry intoStillbirthsandDeathsinInfancy)and CEMD (the Confidential Enquiry into Maternal Deaths); this gives it a truly perinatal focus, but its remit is now wider and includes all childhood death. This paper reviews the history of confidential enquiries, some o...

2009

Purpose The purpose of this paper is to invite comment on the proposed use of the 71-76 GHz and 81-86 GHz bands for wireless point-to-point services including carriage of broadband wireless technology. • whether the proposed coordination arrangements are appropriate for the proposed spectrum use including whether the proposed database recording method, and self-coordination, arrangements are ap...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید