A game of hide and seek in networks
نویسندگان
چکیده
منابع مشابه
Campaign Rhetoric and the Hide-&-Seek Game
We present a model of political campaigning where a candidate chooses between promoting oneself (positive campaign) or attacking the rival (negative campaign). The media validates the claims made by candidates, and the quality of a candidate is not revealed unless there is a debate about her suitability, i.e. she is the subject of both a positive and a negative campaign. Negative campaigns may ...
متن کاملSteganography - A Game of Hide and Seek in Information Communication
With the growth of communication over computer networks, how to maintain the confidentiality and security of transmitted information have become some of the important issues. In order to transfer data securely to the destination without unwanted disclosure or damage, nature inspired hide and seek tricks such as, cryptography and Steganography are heavily in use. Just like the Chameleon and many...
متن کاملNew amyloid plaques or a game of hide-and-seek?
Melanie Meyer-Luehmann et al. recently reported that amyloid plaques form extremely rapidly-within one day, in three mouse models of Alzheimer’s disease studied longitudinally in vivo [1]. However, the ‘rapid appearance’ of ‘newborn’ amyloid plaques can also be the result of delayed visualization of existing amyloid plaques, which is caused by the increase in the concentration of methoxy-XO4, a...
متن کاملHide and seek on complex networks
Signaling pathways and networks determine the ability to communicate in systems ranging from living cells to human society. We investigate how the network structure constrains communication in social-, man-made and biological networks. We find that human networks of governance and collaboration are predictable on teat-a-teat level, reflecting well defined pathways, but globally inefficient. In ...
متن کاملPlaying Hide-and-Seek: An Abstract Game for Cyber Security
In order to begin to solve many of the problems in the domain of cyber security, they must first be transformed into abstract representations, free of complexity and paralysing technical detail. We believe that for many classic security problems, a viable transformation is to consider them as an abstract game of hide-and-seek. The tools required in this game – such as strategic search and an ap...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Economic Theory
سال: 2020
ISSN: 0022-0531
DOI: 10.1016/j.jet.2020.105119