نتایج جستجو برای: alice code

تعداد نتایج: 173826  

2018
Yuqing Kong Grant Schoenebeck

Prediction markets provide a unique and compelling way to sell and aggregate information, yet a good understanding of optimal strategies for agents participating in such markets remains elusive. To model this complex setting, prior work proposes a three stages game called the Alice Bob Alice (A-B-A) game – Alice participates in the market first, then Bob joins, and then Alice has a chance to pa...

Journal: :IACR Cryptology ePrint Archive 2007
Dan Boneh Eyal Kushilevitz Rafail Ostrovsky William E. Skeith

Consider the following problem: Alice wishes to maintain her email using a storage-provider Bob (such as a Yahoo! or hotmail e-mail account). This storage-provider should provide for Alice the ability to collect, retrieve, search and delete emails but, at the same time, should learn neither the content of messages sent from the senders to Alice (with Bob as an intermediary), nor the search crit...

2006
Myungsook Klassen

The level of difficulty of the first programming course students face has increased considerably when the switch from C++ to Java was made. In an effort to decrease attrition rates and to recruit more students to computer science, the Computer Science Department at California Lutheran University introduced CS0, the pre CS1 course. With restructuring of CS0, the 3D animation software Alice was c...

Introduction: Curriculum is the heart of any educational program and the key elements of higher education for transferring knowledge, attitude, and skills to students. Comparing different educational systems will improve the content and quality of the educational program and will help to improve it .The aim of this study was to compare nursing program in Iran and Alice Lee University in Singapo...

2007
ROB THEW

Quantum communication is the art of transferring a quantum state from one place to another. Traditionally, the sender is named Alice and the receiver Bob. Th e basic motivation is that quantum states code quantum information — called qubits in the case of two-dimensional Hilbert spaces — and that quantum information allows tasks to be performed that could only be achieved far less effi ciently,...

Journal: :CoRR 2011
Michael T. Goodrich Michael Mitzenmacher Olga Ohrimenko Roberto Tamassia

We study oblivious storage (OS), a natural way to model privacy-preserving data outsourcing where a client, Alice, stores sensitive data at an honest-but-curious server, Bob. We show that Alice can hide both the content of her data and the pattern in which she accesses her data, with high probability, using a method that achieves O(1) amortized rounds of communication between her and Bob for ea...

2009
Pooya Farshim

Intuition. Suppose that your lecturer writes the number 25927 on the board and asks everyone in the class for its prime factorisation. Immediately Alice, who is incidentally a friend of the lecturer, shouts 11 × 2357. What conclusion can be drawn from this? Can we conclude that Alice is very good at factoring integers? It might haven been the case that Alice’s favourite primes are 11 and 2357 a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - دانشکده فیزیک 1392

در این پایان نامه تلاش شد تا امکان تولید رادیوایزوتوپ آهن-55 که پیش از این در مرکز تحقیقات کشاورزی هسته ای کرج تولید شده بود، به وسیله کد مونت کارلوی mcnpx شبیه سازی شده تا میزان مطابقت داده های تجربی با نتایج به دست آمده از کد ارزیابی گردد. با استفاده از قابلیت های فراوان کد، مطالعه دقیق و کم هزینه تولید این رادیوایزوتوپ بررسی شده است. در این تحقیق ابتدا با استفاده از کدهای alice، alice/ash و ...

2010
Stephan Dominique Andres

This type of game was introduced by Bodlaender [2]. He considers a variant, which we will call game g, in which Alice must move first and passing is not allowed. In order to obtain upper and lower bounds for a parameter associated with game g, two other variants are useful. In the game B Bob may move first. He may also miss one or several turns, but Alice must always move. In the other variant,...

Journal: :CoRR 2016
Anubhav Chaturvedi Marcin Pawlowski Karol Horodecki

It is known that a PR-BOX (PR), a non-local resource and (2 → 1) random access code (RAC), a functionality (wherein Alice encodes 2 bits into 1 bit message and Bob learns one of randomly chosen Alice’s inputs) are equivalent under the no-signaling condition. In this work we introduce generalizations to PR and (2→ 1) RAC and study their inter-convertibility. We introduce generalizations based on...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید