نتایج جستجو برای: authorized exploiters

تعداد نتایج: 6369  

2014
Nan Li Yi Mu Willy Susilo Fuchun Guo Vijay Varadharajan

Radio Frequency Identification (RFID) has been widely adopted for object identification. An RFID system comprises three essential components, namely RFID tags, readers and a backend server. Conventionally, the system is considered to be controlled by a single party who maintains all the secret information. However, in some practical scenarios, RFID tags, readers and servers could be operated by...

Journal: :International Business Research 2021

This paper is built on the fundamental of Jorgensen and Sorge considering a differential game about fishery problem. In reality, exploiters can be many because non-excludability common resource. Thus, we expand former two players model to N find more different equilibriums in scenario. Through this, want some guidance for changing resource stock. Further control overexploitation.

2014
John D Styrsky

Exploiters of protection mutualisms are assumed to represent an important threat for the stability of those mutualisms, but empirical evidence for the commonness or relevance of exploiters is limited. Here, I describe results from a manipulative study showing that an orb-weaver spider, Eustala oblonga, inhabits an ant-acacia for protection from predators. This spider is unique in the orb-weaver...

Journal: :Proceedings. Biological sciences 2016
Brian S Steidinger James D Bever

Plants in multiple symbioses are exploited by symbionts that consume their resources without providing services. Discriminating hosts are thought to stabilize mutualism by preferentially allocating resources into anatomical structures (modules) where services are generated, with examples of modules including the entire inflorescences of figs and the root nodules of legumes. Modules are often co...

Journal: :Molecular ecology 2013
Domancar Orona-Tamayo Natalie Wielsch Alejandro Blanco-Labra Ales Svatos Rodolfo Farías-Rodríguez Martin Heil

Myrmecophytic Acacia species produce food bodies (FBs) to nourish ants of the Pseudomyrmex ferrugineus group, with which they live in an obligate mutualism. We investigated how the FBs are protected from exploiting nonmutualists. Two-dimensional gel electrophoresis of the FB proteomes and consecutive protein sequencing indicated the presence of several Kunitz-type protease inhibitors (PIs). PIs...

1999
STEFAN J. JOHANSSON

In Multi-Agent Systems (MAS), agents are acting individually and/or in cooperation with other agents in order to fulfill goals set by the initiators of them and thereby maximize some expected utilities. We argue that all form of cooperation is based on an expected raise of some present or future utility and that it should be modelled from a value-perspective. That is, there is no reason for an ...

Journal: :journal of rangeland science 2015
mohammad reza shahraki naghmeh gholami baghi mohsen sharafatmandrad bahareh behmanesh

rangelands are the main sources of forage for livestock feeding by localpeople. beside forage production, rangeland ecosystems provide many other goods andservices such as medicinal plants, recreation, soil and water conservation, wildlife habitat,fishing, hunting, hiking, etc. nevertheless, there are no much information about the waythat local communities think about the rangelands goods and s...

Journal: :Nuclear Engineering and Technology 2019

1998
Kenro Aihara Atsuhiro Takasu

In this paper, we show our visualization approach for supporting interactive document retrieval based on authorized documents, such as survey articles or domain dictionaries. We assume that it is effective for accessing the required information sources that the system let users recognize the information space inclusively. Our research, therefore, aims to support users to access the information ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید