A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Limits of Common Coins: Further Results
[chapter]
2011
Lecture Notes in Computer Science
Further it was shown that for F coin to be useful in securely realizing any one in a a large class of symmetric SFE (SSFE) functionalities, a certain computational assumption (namely the existence of a ...
In [8] it was shown that the coin-tossing functionality F coin has limited use in 2-party secure function evaluation (SFE) in the computationally unbounded (a.k.a information-theoretic) setting. ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. ...
doi:10.1007/978-3-642-25578-6_25
fatcat:l5ftfeeipfchbj3ghj2e3ngkeq
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols
[chapter]
2011
Lecture Notes in Computer Science
of the common randomness. ...
Also, we provide an unconditional result on the uselessness of common randomness, even in the computationally bounded setting. ...
Further, using an extension of a result in [12] , we extend this to arbitrary SFE functionalities by associating a symmetric SFE with every general SFE that has a secure protocol using a source of common ...
doi:10.1007/978-3-642-19571-6_29
fatcat:ghmfbch2qjenxk4ywfparez3pi
Forming perceptions and the limits to public participation on ocean commons: evidence from a citizens jury workshop
2017
International Journal of the Commons
Stakeholder opinions uncovered through workshop discussions also show how commons are viewed today -as an economic resource -highlighting the trend of the mainstreaming of the commodification of the commons ...
As this article reveals, the lessons learned from the Dogger Bank workshop advocate not simply what is required for managing one particular ocean commons, but also highlight some of the public participation ...
After presenting our analysis of the workshop, we conclude with our view on limits to public participation in management of ocean commons. ...
doi:10.18352/ijc.693
fatcat:qdvuzfzmdjh53fwrjcd7s4xszm
COIN-GPS
2014
Proceedings of the 12th annual international conference on Mobile systems, applications, and services - MobiSys '14
Due to poor signal strength, multipath e↵ects, and limited on-device computation power, common GPS receivers do not work indoors. ...
By leveraging the computing power of the cloud, we accommodate longer signals for acquisition, and remove the requirement of decoding timestamps or ephemeris data from GPS signals. ...
Some complementary techniques can further improve the accuracy of COIN-GPS. ...
doi:10.1145/2594368.2594378
dblp:conf/mobisys/NirjonLDPJH14
fatcat:tv3ffcrye5h7xplzopbzr7t6vy
Adjustable Coins
2021
Recreational Mathematics Magazine
We study several variants of this problem, and present possible solution strategies and a hardness result. ...
The probability of success may be implied by randomization in the algorithm, or by assuming a probability distribution on the input space, which lead to different variants of the problem. ...
Let further OP T (C, D+1) be the value of the optimal solution to the {0, 1} A-coins problem for C and penalty D + 1. ...
doi:10.2478/rmm-2021-0009
fatcat:e3qee2b42bf5nk2iab3edixp7e
Adjustable Coins
[article]
2020
arXiv
pre-print
We study several variants of this problem, and present possible solution strategies and a hardness result. ...
The probability of success may be implied by randomization in the algorithm, or by assuming a probability distribution on the input space, which lead to different variants of the problem. ...
Input A summary of the results for discrete coins appears in Table 2 below. ...
arXiv:2008.03676v1
fatcat:gk4kyf4wabd23e2rlyskkpgv5a
Initial Coin Offerings
2020
PLoS ONE
This paper examines the market for initial coin offerings (ICOs). ...
I find that the ICO market is highly susceptible to such environmental shocks, resulting in substantial welfare losses for investors. ...
While these limitations are necessary to avoid biases of the models' internal validity, they reduce the generalizability of the results. ...
doi:10.1371/journal.pone.0233018
pmid:32437413
fatcat:v5hexr3cxzhg7m2o3nrxmghhma
Old Coins
1854
Scientific American
Old Coin ••
The New Haven" Register" says that in pul
ling down a. very old house in New Haven, be
longing to Harvey Stiles, coins were found in
the crannies, one of which, a little larger than ...
All the illuminating gases being car burets of hydrogen, the power of combustion is as follo ws: where the supply of air is limited, so that the gas cannot all be consumed as it is sues from its source ...
doi:10.1038/scientificamerican01281854-155c
fatcat:lqz3lzzoazgl3elcy37vwprepa
EMPLOYING COMMON LIMIT RANGE PROPERTY WITH VARIANTS OF R-WEAKLY COMMUTING MAPPINGS IN METRIC SPACES
2015
The Pure and Applied Mathematics
The object of this paper is to emphasize the role of 'common limit range property' and utilize the same with variants of R-weakly commuting mappings for the existence of common fixed point under strict ...
Our results improve a host of previously known results including the ones contained in Pant [Contractive conditions and common fixed points, Acta Math. Acad. Paedagog. Nyházi. ...
Acknowledgment The authors are thankful to anonymous referees for their remarkable comments, suggestion and ideas that helps to improve this paper. ...
doi:10.7468/jksmeb.2015.22.2.127
fatcat:ubffxrpppbhrvdoqq5kw3w6m6u
Coin trials
2017
Canadian Journal of Philosophy
They point out, further, that one very widespread theory of justification predicts that JUSTIFIED FAIR COINS is false, giving us additional reason to reject it. ...
I will argue that JUSTIFIED FAIR COINS does not inevitably lead to scepticism about the future, and the fact that it is incompatible with a widespread theory of justification may give us reason to doubt ...
Notes on contributor Martin Smith is a lecturer in philosophy at the University of Edinburgh working primarily on logic, epistemology and the philosophy of law. ...
doi:10.1080/00455091.2017.1381936
fatcat:4k75kkavdzcwhhlbiw7rimymxu
Sensing in Coin Discriminators
2007
2007 IEEE Sensors Applications Symposium
This paper describes the technologies used in coin discriminator devices, stressing the improvements and novel mechanisms introduced by the authors in the past few years as a result of the cooperation ...
Emphasis is put on how low-cost sensors are used to characterize coins (or tokens) and discriminate them from their counterfeits. ...
ACKNOWLEDGMENT Partial support from the Spanish Dirección General de Investigación and FEDER under grant DPI2003-08637-C03-01 is acknowledged. ...
doi:10.1109/sas.2007.374389
fatcat:gap3qkp2mzhwfhyijwbcx6vj44
Woodeaton Coins
1931
Journal of Roman Studies
, with the result that his design would become unintelligible. ...
They can accordingly be used to help in cross-dating : and in this connexion the fibulae are specially valuable for the purpose of determining the lower limit of time for the occupation of the field. ...
doi:10.2307/296486
fatcat:tsik54pikvhtreihw3lpgrv4ve
Initial Coin Offering (ICO) evaluation model
2018
Investment Management & Financial Innovations
The article details the decision-making process in the case of CargoX, and also summarizes the results of the evaluation of ICOs Tokens.net, BitClave, Neuromation and WePower. ...
High-tech companies operating in the field of blockchain technology use the Initial Coin Offering (ICO) to raise start-up capital. ...
Further research will go towards improving the decision model (reconsideration of the included parameters, combining functions, etc.) and the preparation of a comprehensive methodology, which will include ...
doi:10.21511/imfi.15(4).2018.14
fatcat:3n6py5uuyzdmvb6lxs6ebto4uy
Private coins versus public coins in interactive proof systems
1986
Proceedings of the eighteenth annual ACM symposium on Theory of computing - STOC '86
An interactive proof system is a method by which one party of unlimited resources, called the prover, can convince a party of limited resources, call the verifier, of the truth of a proposition. ...
This extends the familiar proof system implicit in the notion of NP in that there the verifier may not toss coins or speak, but only listen and verify. ...
Acknowledgements We are grateful to Oded Goldreich and Johan Hastad for pointing out that our proof works for a polynomial number of interactions. ...
doi:10.1145/12130.12137
dblp:conf/stoc/GoldwasserS86
fatcat:5kidpl6wwjcbrj6irgrw2pbppm
Further Results and Considerations on Side Channel Attacks on RSA
[chapter]
2003
Lecture Notes in Computer Science
The result is the private key instead of the plaintext as with attacks on PKCS#1 v.1.5 and v.2.1. ...
These attacks should highlight the fact that the RSA-KEM scheme is not an entirely universal solution to problems of RSAES-OAEP implementation and that even here the manner of implementation is significant ...
and all possible oracle internal coin tosses. ...
doi:10.1007/3-540-36400-5_19
fatcat:jaxgeetj6ndgfjyhck4ngs4prm
« Previous
Showing results 1 — 15 out of 264,283 results