نتایج جستجو برای: threat
تعداد نتایج: 52909 فیلتر نتایج به سال:
We prove that every undiscounted multi-player stopping game in discrete time admits an approximate correlated equilibrium. Moreover, the equilibrium has three appealing properties: trembling-hand perfectness players do not use non-credible threats; normal-form correlation communication is required only before the game starts; uniformness it is an approximate equilibrium in any long enough niteh...
Various worms have a devastating impact on Internet. Packet level network modeling and simulation has become an approach to find effective countermeasures against worm threat. However, current alternatives are not fit enough for this purpose. For instance, they mostly focus on the details of lower layers of the network so that the abstraction of application layer is very coarse. In our work, we...
Influencing discretionary driver behaviours in Australia relies very much on the coercive strategy of deterrence. This paper stems from a thorough review of deterrence theory and risk taking carried out in 2002-03 for the Land Transport Safety Authority, New Zealand (Elliott, 2003). The paper begins by exploring the definition of deterrence leading to the proposition that if motorists do not re...
Threat and Punishment in Public Good Experiments Experimental studies of social dilemmas have shown that while the existence of a sanctioning institution improves cooperation within groups, it also has a detrimental impact on group earnings in the short run. Could the introduction of pre-play threats to punish have enough of a beneficial impact on cooperation, while not incurring the cost assoc...
Delivery of products bought online can violate consumers’ privacy, although not in a straightforward way. In particular, delivery companies that have contracted with a website know the company selling the product, as well as the name and address of the online customer. To make matters worse, if the same delivery company has contracted with many websites, aggregated information per address may b...
Tehdit fiilleri kanun koyucunun tercihine göre tek bir suç olarak düzenlenebileceği gibi basit tehdit ve şartlı şeklinde iki ayrı halinde de düzenlenebilir. fiillerinin birden fazla bağımsız tipi düzenlenmesi “tehdit suçları” adı altında kategorisinin varlığından söz etmek mümkündür. Yürürlükteki Türk ceza hukukunda bulunmamaktadır. Buna karşılık mülga 765 sayılı Ceza Kanunu dönemindeki suçu me...
Demographic threat? –the case of Sweden
Eigenface based recognition is widely used to identify individual faces. This technique is commonly used in human recognition domain. In this research, we are investigating for implementation of a possible solution; which can be used to identify species. The eigenface technique is a novel approach in animal recognition domain [1, 2]. In this application, cats and possums are targeted as species...
Numerous compounds are continuously released into the environment during their production and use. The resulting mixtures contaminate the environment and can be a potential threat to organisms including man. Monitoring programmes are designed to assess levelsof individual compounds and mixtures in various compartments of the environment. Such levels depend on the release rate and the environmen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید