نتایج جستجو برای: retaliation etc in addition

تعداد نتایج: 16998741  

2005
Giampaolo Bella Stefano Bistarelli Fabio Massacci

Security protocols intend to give their parties reasonable assurance that certain security properties will protect their communication session. However, the literature confirms that the protocols may suffer subtle and hidden attacks. Flawed protocols are customarily sent back to the design process, but the costs of reengineering a deployed protocol may be prohibitive. This paper outlines the co...

Journal: :HortTechnology 2000

Journal: :Behavior Analysis in Practice 2018

Journal: :The Journal of Laryngology, Rhinology, and Otology 1901

Journal: :The Journal of Laryngology, Rhinology, and Otology 1897

2007
Thai Q. Chu Mark D. Seery Alison Holman Roxane Cohen Silver

This study examines ethnic and gender differences in open-ended immediate responses to an online prompt provided by a nationwide sample of 1,559 individuals in the days following the 9/11 terrorist attacks. These responses were used to predict longitudinal outcomes over the following 2 years. Results show that African Americans and women responded with more emotions (e.g., sadness, sympathy) th...

Journal: :Proceedings. Biological sciences 2013
Michael E McCullough Eric J Pedersen Jaclyn M Schroder Benjamin A Tabak Charles S Carver

Across and within societies, people vary in their propensities towards exploitative and retaliatory defection in potentially cooperative interaction. We hypothesized that this variation reflects adaptive responses to variation in cues during childhood that life will be harsh, unstable and short--cues that probabilistically indicate that it is in one's fitness interests to exploit co-operators a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید