نتایج جستجو برای: alice code

تعداد نتایج: 173826  

Journal: :Extended Outlooks: The Iowa Review Collection of Contemporary Writing by Women 1981

2009
Elizabeth V. Howard Donna Evans Jill Courte

In previous studies, we have used quantitative methods to examine the effectiveness of the Alice programming language in terms of student enjoyment, confidence, and learning outcomes. However, in terms of the overall quality of a learning experience, quantitative measures provide only part of the story. This paper reports on the use of Alice from a student perspective using qualitative data gat...

Journal: :Australasian J. Combinatorics 2012
Andrés Cordón-Franco Hans van Ditmarsch David Fernández-Duque Joost J. Joosten Fernando Soler-Toscano

Consider three players Alice, Bob and Cath who hold a, b and c cards, respectively, from a deck of d = a+ b+ c cards. The cards are all different and players only know their own cards. Suppose Alice and Bob wish to communicate their cards to each other without Cath learning whether Alice or Bob holds a specific card. Considering the cards as consecutive natural numbers 0, 1, ..., we investigate...

2012
Mykhaylo Zynovyev

This thesis discusses the issues and challenges associated with the design and operation of a data analysis facility for a high-energy physics experiment at a multi-purpose computing centre. At the spotlight is a Tier-2 centre of the distributed computing model of the ALICE experiment at the Large Hadron Collider at CERN in Geneva, Switzerland. The design steps, examined in the thesis, include ...

2007
ROB THEW

Quantum communication is the art of transferring a quantum state from one place to another. Traditionally, the sender is named Alice and the receiver Bob. Th e basic motivation is that quantum states code quantum information — called qubits in the case of two-dimensional Hilbert spaces — and that quantum information allows tasks to be performed that could only be achieved far less effi ciently,...

2006
Patrick McDaniel

Information flow policies (labels and lattices) are not stated in terms that administrators and developers articulate security goals (natural language). This raises an important question central to the proposed investigation, “how do you translate higher level policies into information flow implementation?” Our approach is to develop models and algorithms that enable this translation. Consider ...

2003
MASSOUD AMINI M. AMINI

In classical public key cryptography the security of the cryptosystems are based on the difficulty of calculating certain functions. A famous example is the ASP cryptosystem which was based on the assumption that factoring large integers could not be done in polynomial time (on classical computers). The typical situation in these systems is that two parties (Bob and Alice) whish to communicate ...

Journal: :CoRR 2016
Abhinav Aggarwal Varsha Dani Thomas P. Hayes Jared Saia

Alice and Bob are connected via a two-way binary channel. This paper describes an algorithm to enable Alice to send a message to Bob when 1) an oblivious adversary flips an unknown number of bits, T , on the channel; and 2) the message length L, and a desired error probability, ǫ are public knowledge. With probability at least 1− ǫ, our algorithm ensures that Bob receives the correct message, a...

1998
Adam Meyers Catherine Macleod Roman Yangarber Ralph Grishman Leslie Barrett Ruth Reeves

This paper describes how NOMLEX, a dictionary of nominalizations, can be used in Information Extraction (IE). This paper details a procedure which maps syntactic and semantic information designed for writing an IE pattern for an active clause (IBM appointed Alice Smith as vice president) into a set of patterns for nominaliza-tions (e.g., IBM's appointment of Alice Smith as vice president and Al...

2010
Nebojsa Milosavljevic

In this work we study the problem of confidential communication when different resources of randomness are available. We start with the relay channel where source observations are available at each terminal. We study the scenario where the transmitter (Alice) sends a private message to the destination (Bob), which is confidential to the relay (Eve). Alice and Bob also want to agree on a secret ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید