نتایج جستجو برای: stealth properties
تعداد نتایج: 870525 فیلتر نتایج به سال:
Using audit trail data for a sample of NYSE firms we show that medium-size trades are associated with a disproportionately large cumulative stock price change relative to their proportion of all trades and volume. This result is consistent with the predictions of Barclay and Warner’s (1993) stealth-trading hypothesis. We find that the source of this disproportionately large cumulative price imp...
The available DNA sequence data on an African green monkey simian cytomegalovirus virus (SCMV)-derived stealth adapted virus are summarized. The data provide important insight into a generic mechanism by which viruses avoid effective immunological recognition by the cellular immune system. This process is termed stealth adaptation and comprises the deletion or mutation of the relatively few vir...
Over the last few decades, nanocarriers for drug delivery have emerged as powerful tools with unquestionable potential to improve the therapeutic efficacy of anticancer drugs. Many colloidal drug delivery systems are underdevelopment to ameliorate the site specificity of drug action and reduce the systemic side effects. By virtue of their small size they can be injected intravenously and dispos...
Temporal phase mask encrypted optical steganography carried by amplified spontaneous emission noise.
A temporal phase mask encryption method is proposed and experimentally demonstrated to improve the security of the stealth channel in an optical steganography system. The stealth channel is protected in two levels. In the first level, the data is carried by amplified spontaneous emission (ASE) noise, which cannot be detected in either the time domain or spectral domain. In the second level, eve...
The ability to distract opponents is a key mechanic in many stealth games. Existing search-based approaches to stealth analysis, however, focus entirely on solving the non-detection problem, for which they rely on static, ahead-of-time models of guard movements that do not depend on player interaction. In this work we extend and optimize an approach based on heuristic search of stealth games to...
A distinctive feature of intelligent game-based learning environments is their capacity for enabling stealth assessment. Stealth assessments gather information about student competencies in a manner that is invisible, and enable drawing valid inferences about student knowledge. We present a framework for stealth assessment that leverages deep learning, a family of machine learning methods that ...
Controlling and managing rights of digital contents has been becoming very critical in cloud-based consumer entertainment devices. The kernel-level digital rights management (DRM) software can offer stronger protection of digital contents. For effectively preventing unauthorized copying, the rootkit stealth technologies may be employed in consumer electronics (CE) environments to conceal kernel...
Rarely does an AI algorithm form the core mechanic of a commercial game. But this is what happened in the case of Third Eye Crime, an upcoming stealth puzzler by Moonshot Games, soon to be released on iOS, whose gameplay relies heavily on the use of Occupancy Maps.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید