Results 61 to 70 of about 363,353 (192)

Regression Based Expected Shortfall Backtesting

open access: yes, 2019
This paper introduces novel backtests for the risk measure Expected Shortfall (ES) following the testing idea of Mincer and Zarnowitz (1969). Estimating a regression framework for the ES stand-alone is infeasible, and thus, our tests are based on a joint
Bayer, Sebastian, Dimitriadis, Timo
core   +1 more source

Survival probability in diffractive Higgs production in high density QCD

open access: yes, 2007
In this paper, the contribution of hard processes described by the BFKL pomeron exchange, is taken into account by calculating the first enhanced diagram. The survival probability is estimated, using the ratio of the first enhanced diagram and the single
A. Bialas   +27 more
core   +1 more source

Comparing data quality between online panel and intercept samples

open access: yesMethodological Innovations, 2016
Although some research effort has been devoted to the comparison of probability- and nonprobability-based Web surveys, different types of nonprobability-based samples have not been thoroughly examined.
Mingnan Liu
doaj   +1 more source

Security-Reliability Analysis of Noma-Based Multi-Hop Relay Networks in Presence of an Active Eavesdropper with Imperfect Eavesdropping CSI

open access: yesAdvances in Electrical and Electronic Engineering, 2017
In this paper, we evaluate system performances of a multi-hop relay protocol with presence of an active eavesdropper. In the proposed protocol, a source attempts to transmit its data to a destination with assistance of multiple intermediate relays.
Tran Tin Phu   +3 more
doaj   +1 more source

Intercept Probability of Underlay Uplink CRNs with Multi-Eavesdroppers

open access: yes2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2019
The present contribution investigates the physical layer security in a cognitive radio network (CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary sources, a single-antenna secondary base station, and multiple eavesdroppers. In addition, we assume that the secondary sources transmit their data sequentially and that a
Bouabdellah, Mounia   +6 more
openaire   +2 more sources

Security and Reliability Analysis of the Power Splitting-Based Relaying in Wireless Sensors Network

open access: yesSensors
This paper studies the security and reliability of the power splitting (PS)-based relaying in the Internet of Things (IoT) networks with the help of a jammer.
Minh Tran   +5 more
doaj   +1 more source

Intercept-Resend Attack on SARG04 Protocol: An Extended Work

open access: yesPolytechnic Journal, 2020
In this paper, intercept/resend eavesdropper attack over SARG04 quantum key distribution protocol is investigated by bounding the information of an eavesdropper; then, the attack has been analyzed.
Ali H. Yousif   +3 more
doaj   +1 more source

Assessing the Potential Impact of a Nationwide Class-Based Affirmative Action System

open access: yes, 2015
We examine the possible consequences of a change in law school admissions in the United States from an affirmative action system based on race to one based on socioeconomic class.
Rubin, Donald B., Xiang, Alice
core   +1 more source

Likelihood Inference In Parallel Systems Regression Models With Censored Data [PDF]

open access: yes, 1997
The work in this thesis is concerned with the investigation of the finite sample performance of asymptotic inference procedures based on the likelihood function when applied to the regression model based on parallel systems with censored data.
S.M.Baklizi, Ayman
core  

Experimental investigation of quantum key distribution with position and momentum of photon pairs

open access: yes, 2005
We investigate the utility of Einstein-Podolsky-Rosen correlations of the position and momentum of photon pairs from parametric down-conversion in the implementation of a secure quantum key distribution protocol.
C. H. Bennett   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy