Theft

Known as: thief, steals, Thefts 
Unlawful act of taking property.
National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Smart contracts are computer programs that can be correctly executed by a network of mutually distrusting nodes, without the need… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 6
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The impact of R&D on growth through spillovers has been a major topic of economic research over the last thirty years. A central… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Simultaneous multithreading — put simply, the sharing of the execution resources of a superscalar processor between multiple… (More)
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Electricity theft can be in the form of fraud (meter tampering), stealing (illegal connections), billing irregularities, and… (More)
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
This paper analyzes the interaction between corporate taxes and corporate governance. We show that the characteristics of a… (More)
  • figure 1
  • table 3
  • table 5
  • table 6
  • table 7
Is this relevant?
Highly Cited
2001
Highly Cited
2001
  • Angelo Cangelosi, Stevan Harnad
  • 2001
Using neural nets to simulate learning and the genetic algorithm to simulate evolution in a toy world of mushrooms and mushroom… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
This paper shows that reciprocity has powerful implications for many economic domains. It is an important determinant in the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 4
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The fifth release of the multithreaded language Cilk uses a provably good "work-stealing" scheduling algorithm similar to the… (More)
  • figure I
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper outlines and tests two agency models of dividends. According to the “outcome” model, dividends are the result of… (More)
  • table III
  • table IV
  • table V
  • table VI
  • table VII
Is this relevant?