Search results for "Adversary"
showing 10 items of 29 documents
Reverse-safe data structures for text indexing
2021
We introduce the notion of reverse-safe data structures. These are data structures that prevent the reconstruction of the data they encode (i.e., they cannot be easily reversed). A data structure D is called z-reverse-safe when there exist at least z datasets with the same set of answers as the ones stored by D. The main challenge is to ensure that D stores as many answers to useful queries as possible, is constructed efficiently, and has size close to the size of the original dataset it encodes. Given a text of length n and an integer z, we propose an algorithm which constructs a z-reverse-safe data structure that has size O(n) and answers pattern matching queries of length at most d optim…
Testosterone responses to competition: the opponent’s psychological state makes it challenging
2010
Testosterone (T) increases after competition have typically been attributed to winning, yet there is also evidence that being victorious is not in itself sufficient to provoke a T response. Instead, it has been proposed that T responses are moderated by psychological processes. Here, we investigated whether the opponent's psychological state affected hormonal changes in men competing face to face on a rigged computer task. The results show that, irrespective of outcome, the competition led to increases in heart rate and T levels. We found that the T levels of the participants increased more when their opponents had high self-efficacy and that T levels were not influenced by participants' ow…
The Self as Enemy, the Self as Divine: A Crossroads in the Development of Islamic Anthropology
2008
Soccer analyses by means of artificial neural networks, automatic pass recognition and Voronoi-cells: An approach of measuring tactical success.
2015
Success in a soccer match is usually measured by goals. However, in order to yield goals, successful tactical pre-processing is necessary. If analyzing a match with the focus on “success”, promising tactical activities including vertical passes with control win in the opponent’s penalty area have to be the focus. Whether or not a pass is able to crack the opponent’s defence depends on the tactical formations of both the opponent’s defence and the own offence group.
Identifying individuality and variability in team tactics by means of statistical shape analysis and multilayer perceptrons.
2012
Abstract Offensive and defensive systems of play represent important aspects of team sports. They include the players’ positions at certain situations during a match, i.e., when players have to be on specific positions on the court. Patterns of play emerge based on the formations of the players on the court. Recognition of these patterns is important to react adequately and to adjust own strategies to the opponent. Furthermore, the ability to apply variable patterns of play seems to be promising since they make it harder for the opponent to adjust. The purpose of this study is to identify different team tactical patterns in volleyball and to analyze differences in variability. Overall 120 s…
MSS: A Multi-Level Data Placement Scheme for Data Survival in Wireless Sensor Networks
2009
In recently popularized unattended wireless sensor networks, sensed data are stored locally or some designated nodes for a long term and retrieved sometime by collectors on demand. Such data may be delete or modified as sensor nodes are always exposed to risks such as random failure and mobile adversary. To maximize the data survival, we propose a secure and efficient scheme - MSS. MSS makes use of hopbounded computational secret sharing to achieve fault tolerance and compromise resilience, and takes advantages of multi-level secret sharing to mitigate communication overhead and improve overall security. MSS has the most advantages in terms of security and efficiency among presented schemes…
Näkemys oikeudenmukaisuudesta ja kihlakunnantuomarin viraltapano 1700-luvun puolivälin Vanhassa Suomessa
2021
Sven Johan Östring hoiti Vanhassa Suomessa sijainneen Savonlinnan tuomiokunnan kihlakunnantuomarin virkaa reilun vuosikymmen ajan keväästä 1747 kesään 1760. Kihlakunnantuomarin ja tuomiokunnan rahvaan välit kärjistyivät 1750-luvun lopulla talonpoikien valittaessa toistuvasti tuomari Östringin väärinkäytöksistä. Talonpoikien mukaan kihlakunnantuomari Östring oli heidän vihamiehensä. Artikkelissa kysytään, miten virkavirhevalitusprosessit etenivät ja mitkä syyt johtivat lopulta kihlakunnantuomarin viraltapanoon. Kihlakunnantuomari Östringin väärinkäytökset olivat luonteeltaan pääasiassa taloudellisia. Valituksissa korostui kuitenkin taloudellisia menetyksiä vahvemmin talonpoikien näkemys oike…
The “corporealization” of the nation: notions of the unclean and viscosity in the nationalist discourse of Spanish fascism
2017
ABSTRACTThe present article focuses on the particular case of the nationalist discourse of Spanish fascism during the Spanish Civil War and the immediate postwar period (1936–1941), in order to explore one specific aspect of it: the characterization of the enemy Republican nation that was to be fought against as unclean and viscous or sticky. The aim here is to analyse what meanings these references possessed and what they can tell us about the general processes of construction of discourses of identity. For this purpose, use is made of certain propositions developed by sociology and anthropology, as a basis upon which to develop the hypothesis that the use of the aforementioned references …
Reverse-Safe Text Indexing
2021
We introduce the notion of reverse-safe data structures. These are data structures that prevent the reconstruction of the data they encode (i.e., they cannot be easily reversed). A data structure D is called z - reverse-safe when there exist at least z datasets with the same set of answers as the ones stored by D . The main challenge is to ensure that D stores as many answers to useful queries as possible, is constructed efficiently, and has size close to the size of the original dataset it encodes. Given a text of length n and an integer z , we propose an algorithm that constructs a z -reverse-safe data structure ( z -RSDS) that has size O(n) and answers decision and counting pattern matc…
Human Security versus Human Development - Behavioristic Approach
2016
Abstract Recent terrorist attacks in Brussels, Paris and Istanbul, are shaking a world bewildered of daily fear of violence, while the contemporary consumer has to deal with the “new wars” emerging in the context of the current socio-economic and political context. The issue is especially thorny since, most of the times, the “enemy” the citizens must face is unknown, not only when it comes to terrorist attacks, but also when dealing with the question of the “enemy” in foods purchased for consumption (food security) or the security of personal data when accessing and using the Internet (cyber security). Consequently, this paper attempts to highlight the way in which the safety and security n…