نتایج جستجو برای: offensive efficiency

تعداد نتایج: 390229  

Journal: :Politics and the life sciences : the journal of the Association for Politics and the Life Sciences 2009
Gautam Mukunda Kenneth A Oye Scott C Mohr

Synthetic biology seeks to create modular biological parts that can be assembled into useful devices, allowing the modification of biological systems with greater reliability, at lower cost, with greater speed, and by a larger pool of people than has been the case with traditional genetic engineering. We assess the offensive and defensive security implications of synthetic biology based on the ...

Journal: :Physiology & behavior 2011
Vanessa Kloke Friederike Jansen Rebecca S Heiming Rupert Palme Klaus-Peter Lesch Norbert Sachser

Aggressive behaviour results from a complex interplay between genetic and environmental factors. Key modulators of aggression include the serotonergic system on the molecular level and experience in prior aggressive contests as an environmental factor. The aim of this study was to elucidate the effects of fighting experience on the display of offensive aggressive behaviour in adult male mice va...

2017
Paulo Henrique Borges José Guilherme Leandro Rechenchosky Luciane Cristina Arantes da Costa Wilson Rinadi

The fundamental tactical principles of the game of soccer represent a set of action rules that guide behaviours related to the management of game space. The aim of this study was to compare the performance of fundamental offensive and defensive tactical principles among youth soccer players from 12 to 17 years old. The sample consisted of 3689 tactical actions performed by 48 soccer players in ...

Journal: :International Mathematical Forum 2006

Journal: :Industrial Law Journal 2014

Journal: :Psychiatric Bulletin 1993

Journal: :IJCWT 2013
Tim J. Grant

Since 2008, several countries have published new national cyber security strategies that allow for the possibility of offensive cyber operations. Typically, national strategies call for the establishment of a cyber operations unit capable of computer network defence, exploitation, and, in some nations, attack. The cyber operations unit will be manned by professionals and operate under governmen...

Journal: :Discrete Applied Mathematics 2013
Ismael González Yero Juan A. Rodríguez-Velázquez Sergio Bermudo

Let G = (V,E) be a graph. For a non-empty subset of vertices S ⊆ V , and vertex v ∈ V , let δS(v) = |{u ∈ S : uv ∈ E}| denote the cardinality of the set of neighbors of v in S, and let S = V − S. Consider the following condition: δS(v) ≥ δS(v) + k, (1) which states that a vertex v has at least k more neighbors in S than it has in S. A set S ⊆ V that satisfies Condition (1) for every vertex v ∈ ...

2014
David S. Waller

Causing people to take offense can occur when a marketer undertakes a controversial advertising campaign. What can make this a particularly important issue is when companies make what for many individuals is a controversial product, like condoms, erectile dysfunction drugs, feminine hygiene products and certain kinds of underwear. Such companies manufacture legitimate products for their target ...

2013
Daegon Cho Alessandro Acquisti H. John Heinz Jae Yeon Kim Byeong Jo Kim

We examine how online commenting is affected by different degrees of commenters’ identifiability: 1) real name accounts on social networking sites (or “real name-SNS accounts”; e.g., Facebook); 2) pseudonym accounts on social networking sites (or “pseudonym-SNS account”; e.g., Twitter); 3) pseudonymous accounts outside social networking sites (or “non-SNS accounts”; e.g., an online newspaper we...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید