Results 1 - 10
of
959
A randomized protocol for signing contracts
, 1990
"... Two parties, A and B, want to sign a contract C over a communication network. To do so, they must “simultaneously” exchange their commitments to C. Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchanging partial commitments in pie ..."
Abstract
-
Cited by 599 (11 self)
- Add to MetaCart
in piece by piece manner. During such a protocol, one party or another may have a slight advantage; a “fair” protocol keeps this advantage within acceptable limits. We present a new protocol that is fair in the sense that, at any stage in its execution, the conditional probability that one party cannot
Computing Visual Correspondence with Occlusions using Graph Cuts
"... Several new algorithms for visual correspondence based on graph cuts [7, 14, 17] have recently been developed. While these methods give very strong results in practice, they do not handle occlusions properly. Specifically, they treat the two input images asymmetrically, and they do not ensure that a ..."
Abstract
-
Cited by 365 (11 self)
- Add to MetaCart
Several new algorithms for visual correspondence based on graph cuts [7, 14, 17] have recently been developed. While these methods give very strong results in practice, they do not handle occlusions properly. Specifically, they treat the two input images asymmetrically, and they do not ensure
The Global Capital Market: Benefactor or Menace
- Journal of Economic Perspectives
, 1998
"... Abstract This paper reviews the theoretical functions, history, and policy problems raised by the international capital market. The goal is to offer a perspective on both the considerable advantages the market offers and on the genuine hazards it poses, as well as on the avenues through which it co ..."
Abstract
-
Cited by 211 (2 self)
- Add to MetaCart
Abstract This paper reviews the theoretical functions, history, and policy problems raised by the international capital market. The goal is to offer a perspective on both the considerable advantages the market offers and on the genuine hazards it poses, as well as on the avenues through which
Resource Allocation in an Asymmetric Technology Race with Temporary Advantages
, 2012
"... Abstract: We consider two opponents that compete in developing asymmetric technologies where each party’s technology is aimed at damaging (or neutralizing) the other’s technology. The situation we consider is different than the classical problem of commercial R&D races in two ways: First, while ..."
Abstract
- Add to MetaCart
Abstract: We consider two opponents that compete in developing asymmetric technologies where each party’s technology is aimed at damaging (or neutralizing) the other’s technology. The situation we consider is different than the classical problem of commercial R&D races in two ways: First, while
Resource Allocation in an Asymmetric Technology Race with Temporary Advantages
, 2012
"... We consider two opponents that compete in developing asymmetric technologies where each party’s technology is aimed at damaging (or neutralizing) the other’s technology. The situation we consider is different than the classical problem of commercial R&D races in two ways: First, while in comme ..."
Abstract
- Add to MetaCart
We consider two opponents that compete in developing asymmetric technologies where each party’s technology is aimed at damaging (or neutralizing) the other’s technology. The situation we consider is different than the classical problem of commercial R&D races in two ways: First, while
REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform
- CT-RSA 2001, volume 2020 of LNCS
, 2001
"... Abstract. Seven years after the optimal asymmetric encryption padding (OAEP) which makes chosen-ciphertext secure encryption scheme from any trapdoor one-way permutation (but whose unique application is RSA), this paper presents REACT, a new conversion which applies to any weakly secure cryptosystem ..."
Abstract
-
Cited by 85 (19 self)
- Add to MetaCart
Abstract. Seven years after the optimal asymmetric encryption padding (OAEP) which makes chosen-ciphertext secure encryption scheme from any trapdoor one-way permutation (but whose unique application is RSA), this paper presents REACT, a new conversion which applies to any weakly secure
A Distributed Representation of Temporal Context
, 2002
"... The principles of recency and contiguity are two cornerstones of the theoretical and empirical analysis of human memory. Recency has been alternatively explained by mechanisms of decay, displacement, and retroactive interference. Another account of recency is based on the idea of variable context (E ..."
Abstract
-
Cited by 169 (42 self)
- Add to MetaCart
is an inherently asymmetric retrieval cue. This allows the model to provide a principled explanation of the widespread advantage for forward recalls in free and serial recall. Modeling data from single-trial free recall, we demonstrate that TCM can simultaneously explain recency and
Displacement, Asymmetric . . .
, 2007
"... In a seminal paper Gibbons and Katz (1991; GK) develop and empirically test an asymmetric information model of the labor market. The model predicts that wage losses following displacement should be larger for layoffs than for plant closings, which was borne out by data from the Displaced Workers Sur ..."
Abstract
- Add to MetaCart
In a seminal paper Gibbons and Katz (1991; GK) develop and empirically test an asymmetric information model of the labor market. The model predicts that wage losses following displacement should be larger for layoffs than for plant closings, which was borne out by data from the Displaced Workers
89 DARWINIAN SELECTION IN ASYMMETRIC WARFARE: THE NATURAL ADVANTAGE OF INSURGENTS AND TERRORISTS
"... I've killed them by the tens of thousands, scoured their countryside at will, pried their allies away, and humiliated them day after day. I have burned their crops and looted their wealth. I've sent a whole generation of their generals into the afterworld... Have I changed nothing? They ar ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
I've killed them by the tens of thousands, scoured their countryside at will, pried their allies away, and humiliated them day after day. I have burned their crops and looted their wealth. I've sent a whole generation of their generals into the afterworld... Have I changed nothing? They are stronger now than before. They are more than before. They fight more sensibly than before. They win when they used to lose. —Hannibal in David Anthony Durham’s “Pride of Carthage” Never engage the same enemy for too long, or he will adapt to your tactics. —Clausewitz Models of human conflict tend to focus on military power, predicting that—all else equal—the stronger side will prevail. This overlooks a key insight from the evolutionary dynamics of competing populations: the process of adaptation by natural selection. Darwinian selection weeds out poor performers and propagates good performers, thus leading to a cumulative increase in effective
Results 1 - 10
of
959