• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 959
Next 10 →

A randomized protocol for signing contracts

by Michael Ben-Or, Oded Goldreich, Silvio Micali, Ronald L. Rivest , 1990
"... Two parties, A and B, want to sign a contract C over a communication network. To do so, they must “simultaneously” exchange their commitments to C. Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchanging partial commitments in pie ..."
Abstract - Cited by 599 (11 self) - Add to MetaCart
in piece by piece manner. During such a protocol, one party or another may have a slight advantage; a “fair” protocol keeps this advantage within acceptable limits. We present a new protocol that is fair in the sense that, at any stage in its execution, the conditional probability that one party cannot

Homeland Security Technologies: Creating an Asymmetric Advantage Early Warning and Remediation: Minimizing the Threat of Bioterrorism

by Philip J Wyatt
"... ..."
Abstract - Add to MetaCart
Abstract not found

Computing Visual Correspondence with Occlusions using Graph Cuts

by Vladimir Kolmogorov, et al.
"... Several new algorithms for visual correspondence based on graph cuts [7, 14, 17] have recently been developed. While these methods give very strong results in practice, they do not handle occlusions properly. Specifically, they treat the two input images asymmetrically, and they do not ensure that a ..."
Abstract - Cited by 365 (11 self) - Add to MetaCart
Several new algorithms for visual correspondence based on graph cuts [7, 14, 17] have recently been developed. While these methods give very strong results in practice, they do not handle occlusions properly. Specifically, they treat the two input images asymmetrically, and they do not ensure

The Global Capital Market: Benefactor or Menace

by Maurice Obstfeld - Journal of Economic Perspectives , 1998
"... Abstract This paper reviews the theoretical functions, history, and policy problems raised by the international capital market. The goal is to offer a perspective on both the considerable advantages the market offers and on the genuine hazards it poses, as well as on the avenues through which it co ..."
Abstract - Cited by 211 (2 self) - Add to MetaCart
Abstract This paper reviews the theoretical functions, history, and policy problems raised by the international capital market. The goal is to offer a perspective on both the considerable advantages the market offers and on the genuine hazards it poses, as well as on the avenues through which

Resource Allocation in an Asymmetric Technology Race with Temporary Advantages

by Golany Boaz , 2012
"... Abstract: We consider two opponents that compete in developing asymmetric technologies where each party’s technology is aimed at damaging (or neutralizing) the other’s technology. The situation we consider is different than the classical problem of commercial R&D races in two ways: First, while ..."
Abstract - Add to MetaCart
Abstract: We consider two opponents that compete in developing asymmetric technologies where each party’s technology is aimed at damaging (or neutralizing) the other’s technology. The situation we consider is different than the classical problem of commercial R&D races in two ways: First, while

Resource Allocation in an Asymmetric Technology Race with Temporary Advantages

by Boaz Golany, Moshe Kress, Michal Penn, Uriel G. Rothblum , 2012
"... We consider two opponents that compete in developing asymmetric technologies where each party’s technology is aimed at damaging (or neutralizing) the other’s technology. The situation we consider is different than the classical problem of commercial R&D races in two ways: First, while in comme ..."
Abstract - Add to MetaCart
We consider two opponents that compete in developing asymmetric technologies where each party’s technology is aimed at damaging (or neutralizing) the other’s technology. The situation we consider is different than the classical problem of commercial R&D races in two ways: First, while

REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform

by Tatsuaki Okamoto, David Pointcheval - CT-RSA 2001, volume 2020 of LNCS , 2001
"... Abstract. Seven years after the optimal asymmetric encryption padding (OAEP) which makes chosen-ciphertext secure encryption scheme from any trapdoor one-way permutation (but whose unique application is RSA), this paper presents REACT, a new conversion which applies to any weakly secure cryptosystem ..."
Abstract - Cited by 85 (19 self) - Add to MetaCart
Abstract. Seven years after the optimal asymmetric encryption padding (OAEP) which makes chosen-ciphertext secure encryption scheme from any trapdoor one-way permutation (but whose unique application is RSA), this paper presents REACT, a new conversion which applies to any weakly secure

A Distributed Representation of Temporal Context

by Marc W. Howard, Michael J. Kahana , 2002
"... The principles of recency and contiguity are two cornerstones of the theoretical and empirical analysis of human memory. Recency has been alternatively explained by mechanisms of decay, displacement, and retroactive interference. Another account of recency is based on the idea of variable context (E ..."
Abstract - Cited by 169 (42 self) - Add to MetaCart
is an inherently asymmetric retrieval cue. This allows the model to provide a principled explanation of the widespread advantage for forward recalls in free and serial recall. Modeling data from single-trial free recall, we demonstrate that TCM can simultaneously explain recency and

Displacement, Asymmetric . . .

by Luojia Hu, Christopher Taber , 2007
"... In a seminal paper Gibbons and Katz (1991; GK) develop and empirically test an asymmetric information model of the labor market. The model predicts that wage losses following displacement should be larger for layoffs than for plant closings, which was borne out by data from the Displaced Workers Sur ..."
Abstract - Add to MetaCart
In a seminal paper Gibbons and Katz (1991; GK) develop and empirically test an asymmetric information model of the labor market. The model predicts that wage losses following displacement should be larger for layoffs than for plant closings, which was borne out by data from the Displaced Workers

89 DARWINIAN SELECTION IN ASYMMETRIC WARFARE: THE NATURAL ADVANTAGE OF INSURGENTS AND TERRORISTS

by Dominic Johnson
"... I've killed them by the tens of thousands, scoured their countryside at will, pried their allies away, and humiliated them day after day. I have burned their crops and looted their wealth. I've sent a whole generation of their generals into the afterworld... Have I changed nothing? They ar ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
I've killed them by the tens of thousands, scoured their countryside at will, pried their allies away, and humiliated them day after day. I have burned their crops and looted their wealth. I've sent a whole generation of their generals into the afterworld... Have I changed nothing? They are stronger now than before. They are more than before. They fight more sensibly than before. They win when they used to lose. —Hannibal in David Anthony Durham’s “Pride of Carthage” Never engage the same enemy for too long, or he will adapt to your tactics. —Clausewitz Models of human conflict tend to focus on military power, predicting that—all else equal—the stronger side will prevail. This overlooks a key insight from the evolutionary dynamics of competing populations: the process of adaptation by natural selection. Darwinian selection weeds out poor performers and propagates good performers, thus leading to a cumulative increase in effective
Next 10 →
Results 1 - 10 of 959
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University