Results 61 to 70 of about 363,353 (192)
Regression Based Expected Shortfall Backtesting
This paper introduces novel backtests for the risk measure Expected Shortfall (ES) following the testing idea of Mincer and Zarnowitz (1969). Estimating a regression framework for the ES stand-alone is infeasible, and thus, our tests are based on a joint
Bayer, Sebastian, Dimitriadis, Timo
core +1 more source
Survival probability in diffractive Higgs production in high density QCD
In this paper, the contribution of hard processes described by the BFKL pomeron exchange, is taken into account by calculating the first enhanced diagram. The survival probability is estimated, using the ratio of the first enhanced diagram and the single
A. Bialas +27 more
core +1 more source
Comparing data quality between online panel and intercept samples
Although some research effort has been devoted to the comparison of probability- and nonprobability-based Web surveys, different types of nonprobability-based samples have not been thoroughly examined.
Mingnan Liu
doaj +1 more source
In this paper, we evaluate system performances of a multi-hop relay protocol with presence of an active eavesdropper. In the proposed protocol, a source attempts to transmit its data to a destination with assistance of multiple intermediate relays.
Tran Tin Phu +3 more
doaj +1 more source
Intercept Probability of Underlay Uplink CRNs with Multi-Eavesdroppers
The present contribution investigates the physical layer security in a cognitive radio network (CRN). To this end, we consider an underlay uplink CRN consisting of multiple secondary sources, a single-antenna secondary base station, and multiple eavesdroppers. In addition, we assume that the secondary sources transmit their data sequentially and that a
Bouabdellah, Mounia +6 more
openaire +2 more sources
Security and Reliability Analysis of the Power Splitting-Based Relaying in Wireless Sensors Network
This paper studies the security and reliability of the power splitting (PS)-based relaying in the Internet of Things (IoT) networks with the help of a jammer.
Minh Tran +5 more
doaj +1 more source
Intercept-Resend Attack on SARG04 Protocol: An Extended Work
In this paper, intercept/resend eavesdropper attack over SARG04 quantum key distribution protocol is investigated by bounding the information of an eavesdropper; then, the attack has been analyzed.
Ali H. Yousif +3 more
doaj +1 more source
Assessing the Potential Impact of a Nationwide Class-Based Affirmative Action System
We examine the possible consequences of a change in law school admissions in the United States from an affirmative action system based on race to one based on socioeconomic class.
Rubin, Donald B., Xiang, Alice
core +1 more source
Likelihood Inference In Parallel Systems Regression Models With Censored Data [PDF]
The work in this thesis is concerned with the investigation of the finite sample performance of asymptotic inference procedures based on the likelihood function when applied to the regression model based on parallel systems with censored data.
S.M.Baklizi, Ayman
core
Experimental investigation of quantum key distribution with position and momentum of photon pairs
We investigate the utility of Einstein-Podolsky-Rosen correlations of the position and momentum of photon pairs from parametric down-conversion in the implementation of a secure quantum key distribution protocol.
C. H. Bennett +6 more
core +1 more source

