THE SPY REGULATIONS.

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Revolutionaries and spies: Spy-good and spy-bad graphs

We study a game on a graph G played by r revolutionaries and s spies. Initially, revolutionaries and then spies occupy vertices. In each subsequent round, each revolutionary may move to a neighboring vertex or not move, and then each spy has the same option. The revolutionaries win if m of them meet at some vertex having no spy (at the end of a round); the spies win if they can avoid this forev...

متن کامل

Spy-Game on Graphs

We define and study the following two-player game on a graph G. Let k ∈ N∗. A set of k guards is occupying some vertices of G while one spy is standing at some node. At each turn, first the spy may move along at most s edges, where s ∈ N∗ is his speed. Then, each guard may move along one edge. The spy and the guards may occupy same vertices. The spy has to escape the surveillance of the guards,...

متن کامل

Binaries discovered by the SPY project *

Aims. The ESO SN Ia Progenitor Survey (SPY) aims at finding merging double degenerate binaries as candidates for supernova type Ia (SN Ia) explosions. A white dwarf merger has also been suggested to explain the formation of rare types of stars like R CrB, extreme helium or He sdO stars. Here we present the hot subdwarf B binary GD 687, which will merge in less than a Hubble time. Methods. The o...

متن کامل

Tinker, Tailor, Soldier, Spy*

We examine the distribution and interpretation of post-copular noun phrases in French when they appear with and without an indefinite article (Marie est (une) physicienne). We propose that the alternation is due to the fact that the indefinite article marks saturation of an NP-internal argument slot, and show that because of this, post-copular indefinite NPs are usually but not always existenti...

متن کامل

Spy-Resistant Keyboard

Current software interfaces for entering text on touch screen devices mimic existing mechanisms such as keyboard typing or handwriting. Unfortunately, these techniques are poor for entering private text such as passwords since they allow observers to figure out what has been typed just by watching. In this paper, we present the Spy-Resistant Keyboard, a novel interface that allows users to ente...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Lancet

سال: 1834

ISSN: 0140-6736

DOI: 10.1016/s0140-6736(02)96564-5