نتایج جستجو برای: unauthorized exploiters
تعداد نتایج: 4344 فیلتر نتایج به سال:
We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...
Urban exploiters and adapters are often coalesced under a term of convenience as 'urban tolerant'. This useful but simplistic characterisation masks a more nuanced interplay between and within assemblages of birds that are more or less well adapted to a range of urban habitats. I test the hypotheses that objectively-defined urban exploiter and suburban adapter assemblages within the broad urban...
Human trafficking is a multi-dimensional problem for which we have incomplete data, limited knowledge of the exploiters, and no understanding of the dynamics of the process. It is a problem that requires a larger, more complete database, understanding of key actors and their interactions in a dynamic environment. These methods exist in the areas of Data Mining, Machine Learning, Network Analysi...
Intraspecific cooperation and interspecific mutualism often feature a marked asymmetry in the scope for exploitation. Cooperation may nevertheless persist despite one-sided opportunities for cheating, provided that the partner vulnerable to exploitation has sufficient control over the duration of interaction. The effectiveness of the threat of terminating an encounter, however, depends upon the...
Interacting agents of exploiters and users within an information ecosystem may be regarded both as biological beings and as part of an economic system of infohabitants. A protection system can be implementing as a filter governing the access to assets. Typically we will have a chain of attacks and countermeasures concerning this access to the desired assets. We model this process as an arms rac...
This paper deals with the problem of coexistence in the same environment of agents with diierent attitudes towards each other. In previous works of the same authors, agents endowed with diierent help-seeking and help-giving attitudes have been deened and simulated in a multi-agent system, and the effect of their behavior on the global performance of the system has been measured. It has been sho...
The dynamics of resource patches and species that exploit such patches are of interest to ecologists, conservation biologists, modelers, and mathematicians. Here we consider how social interactions can create unique, evolving patterns in space and time. Whereas simple prey taxis (with consumable prey) promotes spatial uniform distributions, here we show that taxis in producer-scrounger groups c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید