نتایج جستجو برای: opportunistic behavior
تعداد نتایج: 638689 فیلتر نتایج به سال:
Background: Cryptosporidiumis known as an opportunist disease-causing agent in man in recent decades. It causes diarrhea and intestinal disorders in the immune deficit and immune competent individuals. This study was aimed to investigate the clinical characteristics of HIV/AIDS patients withcryptosporidiosisinfection. Methods: This cross...
Web-mediated consumer-to-consumer auctions are often regarded as risky due to the opportunistic behaviors in transaction. Online virtual community using feedback-based reputation service is an emerging trust building technology to reduce risk in online auction market. The purpose of this paper is to study the effect of feedback profiles on buyer’s purchase behavior. Based on previous researches...
This article examines the nature of human behavior in a nested social dilemma referred to as the Spillover Game. Players are divided into two groups with positive production interdependencies. Based on theoretically derived opportunistic, local, and global optima, our experimental results demonstrate the importance of in-group beneficiaries over global efficiency. We find that the observed beha...
In recent years, advances in software tools have made it easier to analyze interactive system specifications, and the range of their possible behaviors. However, the effort involved in producing the specifications of the system is still substantial, and a difficulty exists regarding the specification of plausible behaviors on the part of the user. Recent trends in technology towards more mobile...
The ability to process in parallel multiple forms of sensory information, and link sensory-sensory associations to behavior, presumably allows for the opportunistic use of the most reliable and predictive sensory modalities in diverse behavioral contexts. Evolutionary considerations indicate that such processing may represent a fundamental operating principle underlying complex sensory associat...
The advent of the Web has brought an unprecedented amount of information together with a large, diverse set of users. Online users are performing a wider variety of tasks than ever before. For example, not only is the Web being used to search conventional databases like Lexis/Nexus, it is also being used to broker Beanie Babies. Today’s common information seeking metaphors (i.e., keyword search...
Cryptographic security mechanisms often assume that keys or certificates are strongly tied to a party’s identity. This requirement can in practice impose a high bar on making effective use of the cryptographic protections, because securing the coupling between credentials and actual identity can prove to be an arduous process. We frame a more relaxed form of identity, termed opportunistic perso...
If a seller delivers a good non-conforming to contract, European and US warranty law allows consumers to choose between some money transfer and termination. Termination rights are, however, widely criticized, mainly for fear that the buyer may use non-conformity as a pretext for getting rid of a contract he no longer wants. We show that this possibility of “opportunistic termination” might actu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید