نتایج جستجو برای: party action
تعداد نتایج: 642404 فیلتر نتایج به سال:
This paper provides an introduction and overview to mystery values, which are analogues to eigenvalues that arise in the [KWG10] model of secure multiparty computation. Essentially, most of the paper serves to answer, and elaborate on, the question “when can n people simulate a fair coin flip?”
As designs have become more complex, the need for tools to support reuse in the early stages of the design process has become increasingly important. Such tools have the potential to facilitate the simulation and evaluation of designs far before actual implementation. To support these applications, simulation environments must be able to support the reuse of models in many ways. Although there ...
Costly third party punishment has been interpreted as a tool for studying the enforcement of social norms. Experiments on this topic typically involve a third party observer who can pay to decrease the payoff of a player who has behaved selfishly (or generously) toward another. We investigate whether third parties are also willing to engage in costly rewarding, and whether third party responses...
promise de port fort is an useful legal basic for justification many civil and commercial transactions. such as bank guaranties, insurance and guaranty of things it divides two legal relations, relation between parties if third party not ratify and relation with third party if she or he ratify that promise. unlike its appearance, it, is not violation the principle of relativity of contracts. be...
در این پایان نامه ربات متحرک چرخ دار به همراه دو تریلر مورد تحلیل و بررسی قرار می گیرد. در ابتدا سیستم مورد نظر معرفی شده و تمامی فرضیات هندسی و مشخصات جرمی مورد نیاز بیان می شود. در بخش بعد، بردار مختصات تعمیم یافته ربات و همچنین بردار ورودی مدل سینماتیکی ربات در نظر گرفته شده و در نتیجه سینماتیک مستقیم ربات حاصل می شود. از روی مدل سینماتیکی ربات، ماتریس ژاکوبین را می توان استخراج کرد. با توجه...
arising of loss entitles the third party to the compensation. in this respect, more often than not, the entitlement of the third party finds its justification based on voluntary principles and sometimes based on involuntary ones. if the third party cannot find defense based on voluntary principles, he or she has to resort to involuntary ones. the possibility of multiple compensation methods cou...
In [Eurocrypt 2004] Katz and Ostrovsky establish the exact round complexity of secure two-party computation with respect to black-box proofs of security. They prove that 5 rounds are necessary for secure two-party protocols (4-round are sufficient if only one party receives the output) and provide a protocol that matches such lower bound. The main challenge when designing such protocol is to pa...
an action resulting from an object like human's damaging action can cause liability for those who possess them. the french civil law at its approval time (1804) had not predicted this principle and just in articles 1385, 1386, the liability of damages resulting from two types of objects, i.e. animals and buildings due to imposing great damages by them had been predicted by french law. howe...
We describe an algorithm for a novel task: disambiguating the pronoun you in conversation. You can be generic or referential; finding referential you is important for tasks such as addressee identification or extracting ‘owners’ of action items. Our classifier achieves 84% accuracy in two-person conversations; an initial study shows promising performance even on more complex multi-party meetings.
Parties as one of the most important social forces shaped by social Cleavages and seek to manage them. Less society can be found that has not social divide. In Turkey, as a legacy of a plural society, there are several social Cleavage are generally active. Purpose of this research is addressing the AKP experience in managing social Cleavage by examining the historical process is the formation o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید