نتایج جستجو برای: continuous non malleability

تعداد نتایج: 1546963  

2006
Kaoutar El Maghraoui Travis J. Desell Boleslaw K. Szymanski Carlos A. Varela

Malleability enables a parallel application’s execution system to split or merge processes modifying the parallel application’s granularity. While process migration is widely used to adapt applications to dynamic execution environments, it is limited by the granularity of the application’s processes. Malleability empowers process migration by allowing the application’s processes to expand or sh...

2001
Moses Liskov Anna Lysyanskaya Silvio Micali Leonid Reyzin Adam D. Smith

We study the two-party commitment problem, where two players have secret values they wish to commit to each other. Traditional commitment schemes cannot be used here because they do not guarantee independence of the committed values. We present three increasingly strong definitions of independence in this setting and give practical protocols for each. Our work is related to work in non-malleabl...

2017
Brian M. Lee Markus Kemmelmeier

In light of recent challenges to the strength model of self-control, our study re-examines the effects of self-control training on established physical and self-report measures of self-control. We also examined whether beliefs about the malleability of self-control qualify any training effects. Participants in the training condition were assigned to increase use of their non-dominant hand for t...

Journal: :Journal of the Franklin Institute 1925

2015
Ashley J. Thomas Barbara W. Sarnecka

A person's belief about whether intelligence can change (called their implicit theory of intelligence) predicts something about that person's thinking and behavior. People who believe intelligence is fixed (called entity theorists) attribute failure to traits (i.e., "I failed the test because I'm not smart.") and tend to be less motivated in school; those who believe intelligence is malleable (...

Journal: :CoRR 1998
Francis Wolinski Frantz Vichot Olivier Gremont

For its internal needs as well as for commercial purposes, CDC Group has produced several NLP-based on-line contentware applications for years. The development process of such applications is subject to numerous constraints such as quality of service, integration of new advances in NLP, direct reactions from users, continuous versioning, short delivery deadlines and cost control. Following this...

2015
Marcin Andrychowicz Stefan Dziembowski Daniel Malinowski Lukasz Mazurek

We study the problem of malleability of Bitcoin transactions. Our first two contributions can be summarized as follows: (i) we perform practical experiments on Bitcoin that show that it is very easy to maul Bitcoin transactions with high probability, and (ii) we analyze the behavior of the popular Bitcoin wallets in the situation when their transactions are mauled; we conclude that most of them...

Journal: :CoRR 2005
Ali Bagherzandi Kooshiar Azimian Javad Mohajeri Mahmoud Salmasizadeh

In this paper we try to unify the frameworks of definitions of semantic security, indistinguishability and non-malleability by defining semantic security in comparison based framework. This facilitates the study of relations among these goals against different attack models and makes the proof of the equivalence of semantic security and indistinguishability easier and more understandable. Besid...

2002
Jacques Stern David Pointcheval John Malone-Lee Nigel P. Smart

Methods from provable security, developed over the last twenty years, have been recently extensively used to support emerging standards. However, the fact that proofs also need time to be validated through public discussion was somehow overlooked. This became clear when Shoup found that there was a gap in the widely believed security proof of OAEP against adaptive chosen-ciphertext attacks. We ...

Journal: :Trends in Cognitive Sciences 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید