نتایج جستجو برای: offensive

تعداد نتایج: 2404  

2012
Mustapha Chellali Lutz Volkmann

Let k ≥ 0 be an integer. A set S of vertices of a graph G = (V (G), E(G)) is called a global offensive k-alliance if |N(v) ∩ S| ≥ |N(v) − S| + k for every v ∈ V (G) − S, where 0 ≤ k ≤ ∆ and ∆ is the maximum degree of G. The global offensive k-alliance number γ o (G) is the minimum cardinality of a global offensive k-alliance in G. We show that for every bipartite graph G and every integer k ≥ 2...

2004
Shabbir Ahmed Farzana Mithun

Generally a content based spam filter works on words and phrases of email text and if it finds offensive content it gives that email a numerical value (depending on the content). After crossing a certain threshold, that email may be considered as SPAM. This technique works well only if the offensive words are lexically correct. That means the words must be valid words with correct spelling. Oth...

Journal: :Pharmacology, biochemistry, and behavior 2006
Lesley A Ricci Khampaseuth Rasakham Jill M Grimes Richard H Melloni

Repeated high dose (5.0 mg/kg) anabolic/androgenic steroid exposure during adolescence stimulates offensive aggression in male Syrian hamsters. These studies examined whether anabolic/androgenic steroid-induced aggression was regulated by the activity and expression of serotonin (5HT) type-1A receptors. In a first experiment, adolescent male hamsters were treated with a mixture of anabolic/andr...

Journal: :CoRR 2013
Krystal Blanco Aida Briceno Andrea Steele Javier Tapia John McKay Sherry Towers Kamuela E. Yong

The 21st century has redefined the way we communicate, our concept of individual and group privacy, and the dynamics of acceptable behavioral norms. The messaging dynamics on Twitter, an internet social network, has opened new ways/modes of spreading information. As a result cyberbullying or in general, the spread of offensive messages, is a prevalent problem. The aim of this report is to ident...

2015
Birhanu Eshete Abeer Alhuzali Maliheh Monshizadeh Phillip A. Porras V. N. Venkatakrishnan Vinod Yegneswaran

The emergence of exploit kits is one of the most important developments in modern cybercrime. Much of cybersecurity research in the recent years has been devoted towards defending citizens from harm delivered through exploit kits. In this paper, we examine an alternate, counter-offensive strategy towards combating cybercrime launched through exploit kits. Towards this goal, we survey a wide ran...

Journal: :Journal of strength and conditioning research 2012
Pedro E Alcaraz J Arturo Abraldes Carmen Ferragut Helena Vila Nuria Rodríguez Francisco M Argudo

The aim of this study was to define and examine the relationships between the anthropometrical characteristics, maximum isometric grip strength, and competition throwing velocities and efficacy indices in high-level water polo player. Eleven elite trained male water polo players participated in this study. During preseason training, the following measures were taken: standard anthropometry (hei...

2009
Kennard Laviers Gita Sukthankar Matthew Klenk David W. Aha Matthew Molineaux

Plays are sequences of actions to be undertaken by a collection of agents, or teammates. The success of a play depends on a number of factors including, perhaps most importantly, the opponent’s play. In this paper, we present an approach for online opponent modeling and illustrate how it can be used to improve offensive performance in the Rush 2008 football simulator. In football, team behavior...

Journal: :IGTR 2017
J. Quetzalcóatl Toledo-Marín Rogelio Díaz-Méndez Marcelo del Castillo-Mussot

A checkers-like model game with a simplified set of rules is studied through extensive simulations of agents with different expertise and strategies. The introduction of complementary strategies, in a quite general way, provides a tool to mimic the basic ingredients of a wide scope of real games. We find that only for the player having the higher offensive expertise (the dominant player), maxim...

Journal: :Politics and the life sciences : the journal of the Association for Politics and the Life Sciences 2009
Gautam Mukunda Kenneth A Oye Scott C Mohr

Synthetic biology seeks to create modular biological parts that can be assembled into useful devices, allowing the modification of biological systems with greater reliability, at lower cost, with greater speed, and by a larger pool of people than has been the case with traditional genetic engineering. We assess the offensive and defensive security implications of synthetic biology based on the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید