Industrial Location Models 2: Weber, Palander, Hotelling, and Extensions within a New Framework

1986 ◽  
Vol 18 (3) ◽  
pp. 293-306 ◽  
Author(s):  
M Birkin ◽  
A G Wilson

In an earlier paper, the unified theoretical framework was applied to a broad range of alternative approaches to industrial location modelling. These explorations are used in this paper to construct a more general industrial location model from which many of the models can be derived as special cases.

1978 ◽  
Vol 1 (4) ◽  
pp. 395-398
Author(s):  
Seppo Eriksson ◽  
Esko Toiviainen

1985 ◽  
Vol 16 ◽  
pp. 217-234
Author(s):  
Kazuaki MIYAMOTO ◽  
Hideo NAKAMURA ◽  
Shigeki YAGI

1983 ◽  
Vol 1983 (339) ◽  
pp. 155-165
Author(s):  
Kazuaki MIYAMOTO ◽  
Hideo NAKAMURA ◽  
Yoshitsugu HAYASHI

1999 ◽  
Vol 10 ◽  
pp. 117-167 ◽  
Author(s):  
N. Friedman ◽  
J. Y. Halpern

The study of belief change has been an active area in philosophy and AI. In recent years two special cases of belief change, belief revision and belief update, have been studied in detail. In a companion paper (Friedman & Halpern, 1997), we introduce a new framework to model belief change. This framework combines temporal and epistemic modalities with a notion of plausibility, allowing us to examine the change of beliefs over time. In this paper, we show how belief revision and belief update can be captured in our framework. This allows us to compare the assumptions made by each method, and to better understand the principles underlying them. In particular, it shows that Katsuno and Mendelzon's notion of belief update (Katsuno & Mendelzon, 1991a) depends on several strong assumptions that may limit its applicability in artificial intelligence. Finally, our analysis allow us to identify a notion of minimal change that underlies a broad range of belief change operations including revision and update.


2020 ◽  
Vol 6 (37) ◽  
pp. eaaz4487 ◽  
Author(s):  
Margarida Pereira ◽  
Go Kato ◽  
Akihiro Mizutani ◽  
Marcos Curty ◽  
Kiyoshi Tamaki

In theory, quantum key distribution (QKD) offers information-theoretic security. In practice, however, it does not due to the discrepancies between the assumptions used in the security proofs and the behavior of the real apparatuses. Recent years have witnessed a tremendous effort to fill the gap, but the treatment of correlations among pulses has remained a major elusive problem. Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations. Our method is compatible with those security proofs that accommodate all the other typical device imperfections, thus paving the way toward achieving implementation security in QKD with arbitrary flawed devices. Moreover, we introduce a new framework for security proofs, which we call the reference technique. This framework includes existing security proofs as special cases, and it can be widely applied to a number of QKD protocols.


Sign in / Sign up

Export Citation Format

Share Document