نتایج جستجو برای: cheating

تعداد نتایج: 2423  

2017
Roman Popat Freya Harrison Ana C da Silva Scott A S Easton Luke McNally Paul Williams Stephen P Diggle

Bacteria produce a wide variety of exoproducts that favourably modify their environment and increase their fitness. These are often termed 'public goods' because they are costly for individuals to produce and can be exploited by non-producers (cheats). The outcome of conflict over public goods is dependent upon the prevailing environment and the phenotype of the individuals in competition. Many...

2006
ANTHONY D. ONG

To estimate frequencies of behaviors not carried out in public view, researchers generally must rely on self-report data. We explored 2 factors expected to influence the decision to reveal: (a) privacy (anonymity vs. confidentiality) and (b) normalization (providing information so that a behavior is reputedly commonplace or rare). We administered a questionnaire to I55 undergraduates. For 79 re...

2015
Guang Ping He

Cheat sensitive quantum bit commitment (CSQBC) loosens the security requirement of quantum bit commitment (QBC), so that the existing impossibility proofs of unconditionally secure QBC can be evaded. But here we analyze the common features in all existing CSQBC protocols, and show that in any CSQBC having these features, the receiver can always learn a non-trivial amount of information on the s...

Journal: :Biology letters 2005
Karen L Cheney Isabelle M Côté

The exact nature of many interspecific interactions remains unclear, with some evidence suggesting mutualism and other evidence pointing to parasitism for the same pair of interacting species. Here, we show spatial variation in the outcome of the cleaning relationship between Caribbean cleaning gobies (Elacatinus evelynae) and longfin damselfish (Stegastes diencaeus) over the distribution range...

2007
D. D. Carpenter T. S. Harding C. J. Finelli

Student academic dishonesty, commonly referred to as cheating, has become a serious problem at institutions of higher education. This is particularly true of engineering students who, according to previous research, are among the most likely to cheat in college. In addition, research on college students in all fields has indicated that such behavior is more common among students who participate...

2017
Michael Baird Joseph Clare

Introduction: With a definition that is evolving, a serious component of the contract cheating issue involves individuals paying a third-party to complete assessment items for them and then submitting this work as if it were their own. The issue of contract cheating poses a significant problem for tertiary institutions. The research literature conducted to date has addressed contract cheating, ...

2013
Ting Jiang

This paper employs two variants of the “mind game” to show how a subtle variation in the game's rules affects cheating. In both variants of the game, cheating is invisible because subjects make their choices purely in their minds. The only difference stems from the ordering of steps that subjects are instructed to follow when playing the game. The order of play has a significant impact on cheat...

2009
Stefano De Paoli Aphra Kerr

Massive Multiplayer Online Role-Playing Games are socio-technical phenomena that are both complex technological systems and complex societies. They are also highly lucrative businesses. In this paper we present initial findings from a case study of the MMORPG TIBIA which explores the business and social relationships generated by cheating practices. We characterize the economy of cheating as a ...

Journal: :CoRR 2014
Jeril Kuriakose V. Amruth Swathy Nandhini V. Abhilash

Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in Wireless Sensor Networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighbouring nodes or nonanchor nodes calculate its location (or its location reference) with the help of anchor ...

Journal: :CoRR 2014
Jeril Kuriakose V. Amruth A. G. Sandesh Jampu Venkata Naveenbabu Mohammed Shahid Ashish Shetty

Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید