نتایج جستجو برای: counter intelligence

تعداد نتایج: 147504  

Journal: :Electronic Markets 2006
Peter Gomber Miroslav Budimir Uwe Schweickert

Electronic order book trading has evolved in being recognized as the best-practice for trading small and mid-sized orders. Yet, this mechanism does not properly address the needs of large-sized orders which tend to execute off order book in over-the-counter markets. Order book trading provides for public price discovery but not for quantity discovery. Off book executions generally fragment the ...

2017
André Kretzschmar Paul De Boeck

In this commentary, I discuss some critical issues in the study by Greiff, S.; Stadler, M.; Sonnleitner, P.; Wolff, C.; Martin, R., “Sometimes less is more: Comparing the validity of complex problem solving measures”, Intelligence 2015, 50, 100–113. I conclude that—counter to the claims made in the original study—the specific study design was not suitable for deriving conclusions about the vali...

2017
Ray Ison Duan Biggs

Correspo Abstract – Thisessay is anextendedandcritical review,of JohnHanks’bookOperationLockand thewaron rhino poaching, which is an insider account of hitherto untold stories of a secretive undercover operation to gather intelligence to counter the ongoing slaughter of Africa’s elephants and rhinos. Our critique employs the metaphor “ecologyofmind”, followingGregoryBateson, to highlight howsom...

Journal: :JCM 2013
Lijun Qian Xiangfang Li Shuangqing Wei

awareness of their environment and internal state, fulfills the need of dynamic spectrum access for higher spectrum utilization. However, at the same time, the use of cognitive radios further complicates the security problems in wireless networks and introduces additional challenges for a counter measure. Due to the intelligence of the attackers, many of the attacks may be stealthy by nature, s...

2003
JOHN GEAKE

Research into the functioning of the human brain, particularly during the past decade, has greatly enhanced our understanding of cognitive behaviours which are fundamental to education: learning, memory, intelligence, emotion. Here, we argue the case that research findings from cognitive neuroscience hold implications for educational practice. In doing so we advance a bio-psycho-social position...

2015
Kathryn Robb Susan Panichelli-Mindel

Attention deficit/hyperactivity disorder is the most commonly diagnosed neurodevelopmental/psychiatric condition in childhood (CDC; Gruber, 2009). Disturbances in sleep can create a variety of impairments, both cognitive and behavioral, and may negatively affect attention, memory, visuo-spatial abilities, sustained attention and divergent intelligence (creativity) (Stores, 1999). The aim of the...

2016
Gábor Orosz Péter Krekó Benedek Paskuj István Tóth-Király Beáta Bőthe Christine Roland-Lévy

Conspiracy theory (CT) beliefs can be harmful. How is it possible to reduce them effectively? Three reduction strategies were tested in an online experiment using general and well-known CT beliefs on a comprehensive randomly assigned Hungarian sample (N = 813): exposing rational counter CT arguments, ridiculing those who hold CT beliefs, and empathizing with the targets of CT beliefs. Several r...

2002
JENNIFER E. VITALE STEVENS S. SMITH CHAD A. BRINKLEY JOSEPH P. NEWMAN

The reliability and validity of the Psychopathy Checklist–Revised (PCL–R) was examined in a sample of 528 nonpsychotic female offenders participating in a study assessing the generalizability of the instrument to females using personality, attitudinal, and laboratory behavioral measures. Results showed good interrater reliability and adequate internal consistency. Correlations with a number of ...

2008
Goreti Marreiros Ricardo Santos Carlos Freitas Carlos Ramos José Neves José Bulas-Cruz

Decision Making is one of the most important activities of the human being. Nowadays decisions imply to consider many different points of view, so decisions are commonly taken by formal or informal groups of persons. Groups exchange ideas or engage in a process of argumentation and counter-argumentation, negotiate, cooperate, collaborate or even discuss techniques and/or methodologies for probl...

2014
Chris Chapman Scott Knight Tom Dean

This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary’s techniques and objectives are an important element in network and computer security. With the appropriate toolset, security inve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید

function paginate(evt) { url=/search_year_filter/ var term=document.getElementById("search_meta_data").dataset.term pg=parseInt(evt.target.text) var data={ "year":filter_year, "term":term, "pgn":pg } filtered_res=post_and_fetch(data,url) window.scrollTo(0,0); } function update_search_meta(search_meta) { meta_place=document.getElementById("search_meta_data") term=search_meta.term active_pgn=search_meta.pgn num_res=search_meta.num_res num_pages=search_meta.num_pages year=search_meta.year meta_place.dataset.term=term meta_place.dataset.page=active_pgn meta_place.dataset.num_res=num_res meta_place.dataset.num_pages=num_pages meta_place.dataset.year=year document.getElementById("num_result_place").innerHTML=num_res if (year !== "unfilter"){ document.getElementById("year_filter_label").style="display:inline;" document.getElementById("year_filter_place").innerHTML=year }else { document.getElementById("year_filter_label").style="display:none;" document.getElementById("year_filter_place").innerHTML="" } } function update_pagination() { search_meta_place=document.getElementById('search_meta_data') num_pages=search_meta_place.dataset.num_pages; active_pgn=parseInt(search_meta_place.dataset.page); document.getElementById("pgn-ul").innerHTML=""; pgn_html=""; for (i = 1; i <= num_pages; i++){ if (i===active_pgn){ actv="active" }else {actv=""} pgn_li="
  • " +i+ "
  • "; pgn_html+=pgn_li; } document.getElementById("pgn-ul").innerHTML=pgn_html var pgn_links = document.querySelectorAll('.mypgn'); pgn_links.forEach(function(pgn_link) { pgn_link.addEventListener('click', paginate) }) } function post_and_fetch(data,url) { showLoading() xhr = new XMLHttpRequest(); xhr.open('POST', url, true); xhr.setRequestHeader('Content-Type', 'application/json; charset=UTF-8'); xhr.onreadystatechange = function() { if (xhr.readyState === 4 && xhr.status === 200) { var resp = xhr.responseText; resp_json=JSON.parse(resp) resp_place = document.getElementById("search_result_div") resp_place.innerHTML = resp_json['results'] search_meta = resp_json['meta'] update_search_meta(search_meta) update_pagination() hideLoading() } }; xhr.send(JSON.stringify(data)); } function unfilter() { url=/search_year_filter/ var term=document.getElementById("search_meta_data").dataset.term var data={ "year":"unfilter", "term":term, "pgn":1 } filtered_res=post_and_fetch(data,url) } function deactivate_all_bars(){ var yrchart = document.querySelectorAll('.ct-bar'); yrchart.forEach(function(bar) { bar.dataset.active = false bar.style = "stroke:#71a3c5;" }) } year_chart.on("created", function() { var yrchart = document.querySelectorAll('.ct-bar'); yrchart.forEach(function(check) { check.addEventListener('click', checkIndex); }) }); function checkIndex(event) { var yrchart = document.querySelectorAll('.ct-bar'); var year_bar = event.target if (year_bar.dataset.active == "true") { unfilter_res = unfilter() year_bar.dataset.active = false year_bar.style = "stroke:#1d2b3699;" } else { deactivate_all_bars() year_bar.dataset.active = true year_bar.style = "stroke:#e56f6f;" filter_year = chart_data['labels'][Array.from(yrchart).indexOf(year_bar)] url=/search_year_filter/ var term=document.getElementById("search_meta_data").dataset.term var data={ "year":filter_year, "term":term, "pgn":1 } filtered_res=post_and_fetch(data,url) } } function showLoading() { document.getElementById("loading").style.display = "block"; setTimeout(hideLoading, 10000); // 10 seconds } function hideLoading() { document.getElementById("loading").style.display = "none"; } -->