Search results for "Crypt"

showing 10 items of 1111 documents

Statistical Modelling and Risk Analysis of Bitcoins Exchange Rate

2018

Master's thesis Business Administration BE501 - University of Agder 2018 Bitcoin is a phenomenon that is new and there is little information on how and why it behaves as volatile as it does. This thesis uses existing data on Bitcoin’s exchange rate to estimate a model that describes the pattern and use it in a financial risk analysis. We also aim to contribute as a foundation for further studies in this field. The statistical properties of the log-return of the exchange rate are analysed and it is deemed to be iid. From the eleven distributional candidates we study is the fitted skew generalised t distribution proven to represent the data best after evaluation by criteria and statistics. Th…

modellingVDP::Samfunnsvitenskap: 200::Økonomi: 210statistical analysisstatistical distributionsBE501cryptocurrenciesexchange rateBitcoin
researchProduct

L'eldorado Bitcoin

2018

Conçu par ses inventeurs comme le fondement d'un nouvel ordre monétaire, le Bitcoin semble avoir été rattrapé par la finance et devenir l'occasion de spéculations juteuses. Presque 10 ans après le lancement du Bitcoin, Bercy souhaiterait, avec l'aide de l'Autorité des Marchés Financiers et d'une réglementation souple et incitative, faire de Paris la place financière la plus attractive pour les ICO (Initial Coin Offering), ces levées de fonds en cryptomonnaies qui ont connu une progression record au premier trimestre de l'année 2018. Début janvier, d'autres pays tels la Chine ou la Corée du Sud durcissaient leurs positions face à ce nouvel écosystème, tandis que des projets de monnaies digit…

monnaiecryptomonnaiefinance[QFIN] Quantitative Finance [q-fin]
researchProduct

Erradicando la xenofobia y la aporofobia desde la compasión ética como capacidad clave de la neuroeducación moral

2021

Drawing on the contributions of some of the most recent and relevant studies on neuroethics and moral neuroeducation, this paper undertakes an analysis of compassion. In order to focus on the results of this neuroscientific research a reductionist naturalist framework is set aside in order to embrace the broader outlook of a moral neuroeducation that, firstly, refuses to reduce its normative character to the human capacity for evolutionary adaptation; and, secondly, seeks to locate within the brain the neuronal foundations for the development of a capacity for compassion towards those of one’s own community, and also those from outside it. Thereby, this capacity for compassion moves beyond …

moral neuroeducationmedia_common.quotation_subjectcompasiónaporophobiaB1-5802compassionCompassionneuroethicsxenophobiaBlacras socialesempatíaSociologyPhilosophy (General)empathymedia_commonPhilosophy. Psychology. ReligionneuroéticaEnvironmental ethicsneuroeducación moralÈtica socialPhilosophyEducational neuroscienceXenophobiaKey (cryptography)
researchProduct

Towards a comprehensive understanding of new regional industrial path development

2019

Path creation is a key concept in economic geography. So far, particularly scholars within evolutionary economic geography have pioneered research on this topic. This paper critically discusses the...

multi-actor approach05 social sciences0211 other engineering and technologies0507 social and economic geographyPath creationInformationSystems_DATABASEMANAGEMENTGeneral Social Sciences021107 urban & regional planning02 engineering and technologynew regional industrial path developmentinter-path relationsDevelopment (topology)Political sciencePath (graph theory)path creationKey (cryptography)Regional sciencemultiscalar approach050703 geographyGeneral Environmental Science
researchProduct

Student participation in peer interaction

2021

This study explores how students deal with material resources in their peer interaction when working in pairs in an open-ended problem-solving task. The productive use of material resources can be expected to support successful peer work. However, research into social phenomena in peer interaction is needed in order to identify and describe productive and less productive forms of dealing with material resources as students participate in open-ended problem-solving tasks. Consequently, this explorative study responds to this research need. Based on multimodal data, including video recordings, transcribed talk and the written contributions from four pairs of Year 7 students aged 12-13 years, …

open-ended problem-solving taskmedia_common.quotation_subjectForegroundingDevelopment theorylcsh:Education (General)EducationTask (project management)video studyNegotiationWork (electrical)material resourcesOrder (exchange)Material resourcesKey (cryptography)Mathematics educationparticipationlcsh:L7-991lcsh:Science (General)student pairsmedia_commonlcsh:Q1-390LUMAT
researchProduct

Hypervisor-Based White Listing of Executables

2019

We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed

operating systemsmicroprogrammingdatabasesvirtualisointiComputer Networks and CommunicationsComputer science0211 other engineering and technologiesListing (computer)02 engineering and technologycomputer.software_genre020204 information systemsMicrocode0202 electrical engineering electronic engineering information engineeringCode (cryptography)Overhead (computing)virtual machine monitorstietoturvaElectrical and Electronic Engineeringimage segmentation021110 strategic defence & security studieskäyttöjärjestelmätLinuxHypervisorcomputer.file_formatmonitoringOperating systemohjelmointiExecutableLawcomputerIEEE Security & Privacy
researchProduct

Kryptologia a prawo – wybrane zagadnienia: idea kryptowaluty i jej wpływu na ewolucję oszustw w internecie

2016

Rozwój cyberprzestrzeni i jej narzędzi kreuje nowe zagadnienia zarówno w świecie wirtualnym, jak i realnym. Pojawienie się nowego elementu, tzn. waluty cyfrowej w postaci monet kryptograficznych spowodowało szereg zmian w funkcjonowaniu użytkowników w Sieci. Wraz ze zmianami ewoluowały również metody stosowane przez cyberprzestępców. Celem artykułu jest ukazanie, jaki wpływ wywarły monety typu bitcoin na powstanie nowych form oszustw występujących w Internecie

oszustwo komputeroweoszustwobitcoinfraudkryptowalutycomputer fraudcryptocurrencyPrzegląd Nauk Stosowanych
researchProduct

Location-Awareness for Failure Management in Cellular Networks: An Integrated Approach

2021

Recent years have seen the proliferation of different techniques for outdoor and, especially, indoor positioning. Still being a field in development, localization is expected to be fully pervasive in the next few years. Although the development of such techniques is driven by the commercialization of location-based services (e.g., navigation), its application to support cellular management is considered to be a key approach for improving its resilience and performance. When different approaches have been defined for integrating location information into the failure management activities, they commonly ignore the increase in the dimensionality of the data as well as their integration into th…

paikkatiedotProcess (engineering)Computer sciencecellular networksmedia_common.quotation_subjectReliability (computer networking)matkaviestinverkot02 engineering and technologylcsh:Chemical technologycomputer.software_genreverkonhallintaBiochemistryCommercializationArticleField (computer science)Analytical Chemistry0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringfailure managementlcsh:TP1-1185Electrical and Electronic EngineeringResilience (network)Instrumentationmedia_commonviatLocation awareness020206 networking & telecommunications020302 automobile design & engineeringlocation-awarenessAtomic and Molecular Physics and OpticsRisk analysis (engineering)positioningKey (cryptography)Cellular networkPsychological resiliencecomputerlangattomat verkot
researchProduct

Transcriptional study of photoperiodic response in aphids and characterization of candidate photoperiodic photoreceptors

2020

Acyrthosiphon pisum es una especie de pulgón altamente estacional. Durante la estación favorable, únicamente se producen hembras partenogenéticas vivíparas (virginóparas). En otoño, cuando hay menos luz (el fotoperiodo es más corto), A. pisum percibe la diferencia y las virginóparas paren machos y luego hembras sexuadas (ovíparas). Tras aparearse, las ovíparas ponen huevos que resisten el invierno y eclosionan en primavera, reiniciando el ciclo. Algunos mutantes que ocurren de forma natural no responden al fotoperiodo y se reproducen asexualmente durante todo el año. Se denominan anholocíclicos en contraposición a los holocíclicos, que tienen fase sexual. Se desconocen los mecanismos molecu…

photoreceptionaphidphotoperiodismopsinsUNESCO::CIENCIAS DE LA VIDAcryptochrometranscriptome:CIENCIAS DE LA VIDA [UNESCO]
researchProduct

System for Executing Encrypted Java Programs

2017

pääsynvalvontavirtualisointiJavaComputer sciencetrusted computing02 engineering and technologycomputer.software_genreEncryptionReal time Java020204 information systems0202 electrical engineering electronic engineering information engineeringtietoturvahypervisorJava appletcomputer.programming_languageta113Programming languagebusiness.industrystrictfp020207 software engineeringvirtualizationJava concurrencyremote attestationbusinesscomputerJava annotationJavaProceedings of the 3rd International Conference on Information Systems Security and Privacy
researchProduct