نتایج جستجو برای: stealth properties

تعداد نتایج: 870525  

2001
Sugato Chakravarty

Using audit trail data for a sample of NYSE firms we show that medium-size trades are associated with a disproportionately large cumulative stock price change relative to their proportion of all trades and volume. This result is consistent with the predictions of Barclay and Warner’s (1993) stealth-trading hypothesis. We find that the source of this disproportionately large cumulative price imp...

2014
John Martin

The available DNA sequence data on an African green monkey simian cytomegalovirus virus (SCMV)-derived stealth adapted virus are summarized. The data provide important insight into a generic mechanism by which viruses avoid effective immunological recognition by the cellular immune system. This process is termed stealth adaptation and comprises the deletion or mutation of the relatively few vir...

2013
Stefano Salmaso Paolo Caliceti

Over the last few decades, nanocarriers for drug delivery have emerged as powerful tools with unquestionable potential to improve the therapeutic efficacy of anticancer drugs. Many colloidal drug delivery systems are underdevelopment to ameliorate the site specificity of drug action and reduce the systemic side effects. By virtue of their small size they can be injected intravenously and dispos...

Journal: :Optics express 2014
Ben Wu Zhenxing Wang Bhavin J Shastri Matthew P Chang Nicholas A Frost Paul R Prucnal

A temporal phase mask encryption method is proposed and experimentally demonstrated to improve the security of the stealth channel in an optical steganography system. The stealth channel is protected in two levels. In the first level, the data is carried by amplified spontaneous emission (ASE) noise, which cannot be detected in either the time domain or spectral domain. In the second level, eve...

2016
Alexander Borodovski Clark Verbrugge

The ability to distract opponents is a key mechanic in many stealth games. Existing search-based approaches to stealth analysis, however, focus entirely on solving the non-detection problem, for which they rely on static, ahead-of-time models of guard movements that do not depend on player interaction. In this work we extend and optimize an approach based on heuristic search of stealth games to...

2015
Wookhee Min Megan Hardy Frankosky Bradford W. Mott Jonathan P. Rowe Eric N. Wiebe Kristy Elizabeth Boyer James C. Lester

A distinctive feature of intelligent game-based learning environments is their capacity for enabling stealth assessment. Stealth assessments gather information about student competencies in a manner that is invisible, and enable drawing valid inferences about student knowledge. We present a framework for stealth assessment that leverages deep learning, a family of machine learning methods that ...

2015
Woei-Jiunn Tsaur Lo-Yao Yeh

Controlling and managing rights of digital contents has been becoming very critical in cloud-based consumer entertainment devices. The kernel-level digital rights management (DRM) software can offer stronger protection of digital contents. For effectively preventing unauthorized copying, the rootkit stealth technologies may be employed in consumer electronics (CE) environments to conceal kernel...

Journal: :Journal of High Energy Physics 2011

Journal: :Physical Review D 2002

2013
Damián Isla

Rarely does an AI algorithm form the core mechanic of a commercial game. But this is what happened in the case of Third Eye Crime, an upcoming stealth puzzler by Moonshot Games, soon to be released on iOS, whose gameplay relies heavily on the use of Occupancy Maps.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید