نتایج جستجو برای: punishes loss
تعداد نتایج: 446023 فیلتر نتایج به سال:
Delay-tolerant networking (DTN) enables communication in disruptive scenarios where issues such as sparse and intermittent connectivity, long variable delays, high latency, error rates, or no end-to-end connectivity exist. Internet of Vehicles (IoV) is a network the future which integration between devices, vehicles, users will be unlimited universal, overcoming heterogeneity systems, services,...
Distributed Denial of Service (DDoS) attackers make a service unavailable for intended users. Attackers use IP spoofing as a weapon to disguise their identity. The spoofed traffic follows the same principles as normal traffic, so detection and filtering is very essential. Hop Count Filtering (HCF) scheme identifies packet whose source IP address is spoofed. The information about a source IP add...
In an Ad-hoc network, node cooperation is an important factor for successful data transmission among nodes. Most of the routing protocols are based on the assumption that the intermediate node cooperates during data transmission from source node to destination. However, because mobile nodes are constrained by limited energy, bandwidth and computational resources, a node sometimes behaves as sel...
Domain adaptation refers to the problem of leveraging labeled data in a source domain to learn an accurate model in a target domain where labels are scarce or unavailable. A recent approach for finding a common representation of the two domains is via domain adversarial training (Ganin & Lempitsky, 2015), which attempts to induce a feature extractor that matches the source and target feature di...
Due to the dynamic nature of P2P systems, it is impossible to keep an accurate history of the transactions that take place while avoiding security attacks such as whitewashing and collusion, and abuse such as freeriding. This is why it is important to develop a mechanism that both rewards cooperative peers and punishes misbehaving peers. Modeling P2P networks as social structures can allow ince...
We consider a collusive arrangement as an agreement by the players of a game to restrict their choices to certain subsets of their strategy sets. A (collusive) scheme is the Cartesian product of such strategy subsets. We require schemes to be closed under sequential rationality. Using this solution concept, we apply the global game approach (Carlsson and van Damme, 1993) to the infinitely repea...
This thesis examines primetime television’s negative portrayal of the aging process as well as the double standard in aging that benefits men and punishes women. Unlike their male counterparts, older women in television shows are often portrayed in a negative light or, even worse, not represented at all. Older women are almost invisible in prime-time television shows and movies. In my analysis ...
The particle verb construction (PVC), also referred to in the literature as phrasal verb or separable complex verb, occurs in most if not all of the Germanic languages. The work presented here deals with a comparison of the transitive PVC in English and German. In English, the construction occurs in two alternating word orders (They called off the concert vs. They called the concert off ). In G...
Gender-based asylum claims are becoming more prevalent in the United States ("US").2 Specifically, female genital mutilation ("FGM") is an issue that is currently receiving widespread attention.3 This Comment analyzes and criticizes US asylum laws regarding FGM. It advocates redefining the legal element "persecution," a component of the current US asylum test, to include maintaining and perpetu...
BACKGROUND Research indicates that religion may have a positive effect on coping and possibly enhance clinical outcomes. This study aims to determine the level of religious interest of psychiatric inpatients and to assess whether religious commitment has an impact on selected outcome variables. METHODS There were 88 consecutive adult patients (50% men) who were admitted to a Canadian tertiary...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید