Hide and Seek in the Killing Fields
نویسندگان
چکیده
منابع مشابه
Hide and seek in Arizona
Laboratory subjects repeatedly played one of two variations of a simple two-person zero-sum game of ‘‘hide and seek’’. Three puzzling departures from the prescriptions of equilibrium theory are found in the data: an asymmetry related to the player’s role in the game; an asymmetry across the game variations; and positive serial correlation in subjects’ play. Possible explanations for these depar...
متن کاملHide and Seek with Supersymmetry
This is the summary of a 90 minute introductory talk on Supersymmetry presented at the August 1998 Zuoz Summer School on “Hidden Symmetries and Higgs Phenomena”. I first review the hierarchy problem, and then discuss why we expect supersymmetry just around the corner, i.e. at or below 1TeV . I focus on the specific example of the anomalous magnetic moment of the muon to show how supersymmetry c...
متن کاملHide and Seek in a Complex World
Complex networks have become the key to uncover the patterns of interactions in man-made and complex systems in nature. The Internet, the proteins in our cells, our bonds of friendship and the web-pages we daily browse form networks. Despite their widely different origins the networks have many interesting features in common. We endeavor to a better understanding of both man-made structures, li...
متن کاملCampaign Rhetoric and the Hide-&-Seek Game
We present a model of political campaigning where a candidate chooses between promoting oneself (positive campaign) or attacking the rival (negative campaign). The media validates the claims made by candidates, and the quality of a candidate is not revealed unless there is a debate about her suitability, i.e. she is the subject of both a positive and a negative campaign. Negative campaigns may ...
متن کاملHide and Seek in JPEG Images
Recently, the JPEG images are the most common format for storing images. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. So it attracted the attention of researchers as the main steganographic format. There are many new and powerful steganography and steganalysis techniques in JPEG images reported in the literature, in the last few years. In this paper, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Amsterdam Law Forum
سال: 2018
ISSN: 1876-8156
DOI: 10.37974/alf.315