نتایج جستجو برای: sabotage

تعداد نتایج: 598  

2003
Christof Löding Philipp Rohde

We consider the sabotage game as presented by van Benthem. In this game one player moves along the edges of a finite multigraph and the other player takes out a link after each step. One can consider usual algorithmic tasks like reachability, Hamilton path, or complete search as winning conditions for this game. As the game definitely ends after at most the number of edges steps, it is easy to ...

2004
Christine Harbring Bernd Irlenbusch

Incentives in Tournaments with Endogenous Prize Selection Tournament incentive schemes offer payments dependent on relative performance and thereby are intended to motivate agents to exert productive effort. Unfortunately, however, an agent may also be tempted to destroy the production of his competitors in order to improve the own relative position. In the present study we investigate whether ...

2003
Kong-Pin Chen

This article studies the nature, determinants, and impact of “negative” activities in organizations. In competing for promotion, the members in organizations can work not only to enhance their own performances, but also to “sabotage” their opponent’s performances. It is worthwhile for them to engage in negative activities because promotion is generally based on relative, rather than absolute, p...

Journal: :IACR Cryptology ePrint Archive 2015
Bruce Schneier Matt Fredrikson Tadayoshi Kohno Thomas Ristenpart

Revelations over the past couple of years highlight the importance of understanding malicious and surreptitious weakening of cryptographic systems. We provide an overview of this domain, using a number of historical examples to drive development of a weaknesses taxonomy. This allows comparing different approaches to sabotage. We categorize a broader set of potential avenues for weakening system...

Journal: :Contraception 2010
Elizabeth Miller Michele R Decker Heather L McCauley Daniel J Tancredi Rebecca R Levenson Jeffrey Waldman Phyllis Schoenwald Jay G Silverman

BACKGROUND Reproductive control including pregnancy coercion (coercion by male partners to become pregnant) and birth control sabotage (partner interference with contraception) may be associated with partner violence and risk for unintended pregnancy among young adult females utilizing family planning clinic services. STUDY DESIGN A cross-sectional survey was administered to females ages 16-2...

2006
Philipp Rohde

We study logics and games over dynamically changing structures. Van Benthem’s sabotage modal logic consists of modal logic with a cross-model modality referring to submodels from which a transition has been removed. We add constructors for forming least and greatest monadic fixed-points to that logic and obtain the sabotage μ-calculus. We introduce backup parity games as an extension of standar...

Journal: :SSRN Electronic Journal 2013

2004
Philipp Rohde

In this paper we continue the study of ‘sabotage modal logic’ SML which was suggested by van Benthem. In this logic one describes the progression along edges of a transition graph in alternation with moves of a saboteur who can delete edges. A drawback of the known results on SML is the asymmetry of the two modalities of ‘moving’ and ‘deleting’: Movements are local, whereas there is a global ch...

2015
Nina Hafer Manfred Milinski

Host manipulation is a common parasite strategy to alter host behavior in a manner to enhance parasite fitness usually by increasing the parasite's transmission to the next host. In nature, hosts often harbor multiple parasites with agreeing or conflicting interests over host manipulation. Natural selection might drive such parasites to cooperation, compromise, or sabotage. Sabotage would occur...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید