Academic literature on the topic 'Secure omniscience'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure omniscience.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure omniscience"
Tamanoi, Mariko Asano. "Knowledge, Power, and Racial Classifications: The “Japanese” in “Manchuria”." Journal of Asian Studies 59, no. 2 (May 2000): 248–76. http://dx.doi.org/10.2307/2658656.
Full textBadica, Andreea Liliana, and Mircea Ovidiu Mitucă. "IOT-Enhanced Digital Marketing Conceptual Framework." BRAIN. Broad Research in Artificial Intelligence and Neuroscience 12, no. 4 (December 20, 2021): 509–31. http://dx.doi.org/10.18662/brain/12.4/262.
Full textMali, Mateus. "Teodise dan Covid-19." DUNAMIS: Jurnal Teologi dan Pendidikan Kristiani 7, no. 2 (January 9, 2023): 592–609. http://dx.doi.org/10.30648/dun.v7i2.830.
Full textBarker, George. "A Comparative Institutional Approach to Law and Legal Institutions." Victoria University of Wellington Law Review 26, no. 1 (February 1, 1996): 109. http://dx.doi.org/10.26686/vuwlr.v26i1.6181.
Full textEka Maulana, Dimas. "ANALISIS TEKNIK RESTRICTED NARRATION DALAM MEMBANGUN DRAMATIK PADA SINEMATOGRAFI FILM 1917 KARYA SAM MENDES." TONIL: Jurnal Kajian Sastra, Teater dan Sinema 19, no. 2 (December 17, 2022): 90–103. http://dx.doi.org/10.24821/tnl.v19i2.7857.
Full textNgala, Erna, and Veydy Yanto Mangantibe. "Penginjilan Terhadap Masyarakat Plural Berdasarkan Surat Efesus." Excelsis Deo: Jurnal Teologi, Misiologi, dan Pendidikan 5, no. 1 (June 29, 2021): 1–16. http://dx.doi.org/10.51730/ed.v5i1.58.
Full textAshimi, Tijani Ahmad. "Islam and the Acquisition of Knowledge (Islam dan Perolehan Ilmu)." Journal of Islam in Asia (E-ISSN: 2289-8077) 14, no. 3 (January 21, 2018): 311–25. http://dx.doi.org/10.31436/jia.v14i3.635.
Full textRihatno, Taufik. "PELATIHAN BRAIN GYM (SENAM OTAK) PADA PESERTA PPG ASRAMA RUSUNAWA 1 UNIVERSITAS NEGERI JAKARTA." Sarwahita 14, no. 02 (December 1, 2017): 123–31. http://dx.doi.org/10.21009/sarwahita.142.06.
Full textWorsley, Peter John. "Some Thoughts About Genre in Old Javanese Literature." Jumantara: Jurnal Manuskrip Nusantara 12, no. 2 (December 2, 2021). http://dx.doi.org/10.37014/jumantara.v12i2.1148.
Full textKarimi, Negin, Ahmad Yousefian Darani, and Marcus Greferath. "Correcting adversarial errors with generalized regenerating codes." Advances in Mathematics of Communications, 2022, 0. http://dx.doi.org/10.3934/amc.2022005.
Full textDissertations / Theses on the topic "Secure omniscience"
Mukherjee, Manuj. "Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects." Thesis, 2017. http://etd.iisc.ernet.in/2005/3783.
Full textBooks on the topic "Secure omniscience"
Jones, Charlotte. Realism, Form, and Representation in the Edwardian Novel. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198857921.001.0001.
Full textBook chapters on the topic "Secure omniscience"
Schuldiner, Ruth. "The Narrative Tease: Narratorial Omniscience, Implicature and the Making of Sensation in Lady Audley’s Secret." In Pragmatic Literary Stylistics, 172–91. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137023278_10.
Full text"Chapter Five On Doubt and Self-Understanding: The Omniscience of an Author and his Arch-Exponent." In The Secret Sankara, 51–61. BRILL, 2011. http://dx.doi.org/10.1163/9789004216334_006.
Full text"the novel, to the embroidered message in Ethiopian hieroglyphs which Persinna exposed with her daughter and which remained unread until Kalasiris tracked her down in Delphi and deciph ered it: Above all, be sure to find among the treasures that I laid beside you a certain ring. Keep it by you always. It was a gift that your father gave me during our courtship, engraved all around with the royal crest and set with a pantar be jewel that endows it with holy, mystic powers. (4.8.7) These holy, mystic powers are unspecified.9 Nevertheless, the mere mention of them would lead a competent reader to surmise that the plot would exploit them sooner or later, and an exceptionally alert reader might beat the author to the connection in Book 8. It is not difficult to find other sections within the narrative of the Aithiopika which are constructed as riddles, a vital piece of information being kept back and then released as an answer. Two more examples can be mentioned briefly, both from the ninth book, whose military subject matter could easily lead to the false assumption that its narrative technique is simple. Oroondates is besieged by the Ethiopians in Syene. He parleys with them, and secures their permission to send two envoys to his troops at Elephantine, ostensibly to negotiate their surrender at the same time as his. His real motives are not divulged, nor are they when he makes an apparently impossible break-out and stealthily enters Elephantine by night (9.7ff.). The riddle set is: what is his plan?, and, as is by now familiar, the reader’s ignorance is produced by the exploitation of partial in-text viewpoints. In this case all Oroondates’ actions are described as seen by the Ethiopians with out authorial explanation. Some additional clues are given later in the narrative, but the full answer is withheld until the moment when the Persian army from Elephantine suddenly turns up with Oroondates at its head (9.13), at which point the omniscient nar rator intervenes to fill in the gaps he had left in his own narrative. There ensues a battle, in which the Persians have a seemingly decisive weapon, their armoured cavalry. A lengthy description stresses the totality of the protection of both rider and horse and the awesome power of their arms (9.15). Against them Hydaspes stations troops of the Blemmyes and Seres, two subject nations, with special instructions which are not communicated to the." In Greek Literature in the Roman Period and in Late Antiquity, 325. Routledge, 2014. http://dx.doi.org/10.4324/9780203616895-40.
Full textConference papers on the topic "Secure omniscience"
Chan, Chung, Navin Kashyap, Praneeth Kumar Vippathalla, and Qiaoqiao Zhou. "Secure Information Exchange for Omniscience." In 2020 IEEE International Symposium on Information Theory (ISIT). IEEE, 2020. http://dx.doi.org/10.1109/isit44484.2020.9174231.
Full textVippathalla, Praneeth Kumar, Chung Chan, Navin Kashyap, and Qiaoqiao Zhou. "Secret Key Agreement and Secure Omniscience of Tree-PIN Source with Linear Wiretapper." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518075.
Full textChan, Chung, Manuj Mukherjee, Navin Kashyap, and Qiaoqiao Zhou. "When is omniscience a rate-optimal strategy for achieving secret key capacity?" In 2016 IEEE Information Theory Workshop (ITW). IEEE, 2016. http://dx.doi.org/10.1109/itw.2016.7606855.
Full text