Search results for "Adversary"

showing 10 items of 29 documents

Reverse-safe data structures for text indexing

2021

We introduce the notion of reverse-safe data structures. These are data structures that prevent the reconstruction of the data they encode (i.e., they cannot be easily reversed). A data structure D is called z-reverse-safe when there exist at least z datasets with the same set of answers as the ones stored by D. The main challenge is to ensure that D stores as many answers to useful queries as possible, is constructed efficiently, and has size close to the size of the original dataset it encodes. Given a text of length n and an integer z, we propose an algorithm which constructs a z-reverse-safe data structure that has size O(n) and answers pattern matching queries of length at most d optim…

050101 languages & linguisticsComputer sciencedata structure02 engineering and technologyprivacySet (abstract data type)combinatoric0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesPattern matchingSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazionialgorithmSettore INF/01 - Informatica05 social sciencesSearch engine indexingINF/01 - INFORMATICAdata miningData structureMatrix multiplicationcombinatoricsExponent020201 artificial intelligence & image processingdata structure; algorithm; combinatorics; de Bruijn graph; data mining; privacyAlgorithmAdversary modelde Bruijn graphInteger (computer science)
researchProduct

Testosterone responses to competition: the opponent’s psychological state makes it challenging

2010

Testosterone (T) increases after competition have typically been attributed to winning, yet there is also evidence that being victorious is not in itself sufficient to provoke a T response. Instead, it has been proposed that T responses are moderated by psychological processes. Here, we investigated whether the opponent's psychological state affected hormonal changes in men competing face to face on a rigged computer task. The results show that, irrespective of outcome, the competition led to increases in heart rate and T levels. We found that the T levels of the participants increased more when their opponents had high self-efficacy and that T levels were not influenced by participants' ow…

AdultMaleCompetitive BehaviorAdolescentVALIDATIONDevelopmental psychologyCompetition (economics)OpponentFace-to-faceYoung AdultHORMONAL RESPONSESHeart RateHumansTestosteroneSalivaImportanceAnalysis of VariancePsychological TestsPANAS SCALESCompetitionHUMAN MALESHYPOTHESISGeneral NeuroscienceCORTISOLTestosterone (patch)Challenge hypothesisMENMOTIVATIONAdversaryNEGATIVE AFFECTSelf EfficacyAffectNeuropsychology and Physiological PsychologyMoodMOODChallenge hypothesisPsychologySelf-efficacySocial psychologyStress PsychologicalSocial status
researchProduct

The Self as Enemy, the Self as Divine: A Crossroads in the Development of Islamic Anthropology

2008

AnthropologyPhilosophySelfIslamAdversaryReligious studies
researchProduct

Soccer analyses by means of artificial neural networks, automatic pass recognition and Voronoi-cells: An approach of measuring tactical success.

2015

Success in a soccer match is usually measured by goals. However, in order to yield goals, successful tactical pre-processing is necessary. If analyzing a match with the focus on “success”, promising tactical activities including vertical passes with control win in the opponent’s penalty area have to be the focus. Whether or not a pass is able to crack the opponent’s defence depends on the tactical formations of both the opponent’s defence and the own offence group.

Cognitive scienceFocus (computing)Artificial neural networkbusiness.industryControl (management)ComputerApplications_COMPUTERSINOTHERSYSTEMSArtificial intelligenceAdversarybusinessPsychologyVoronoi diagramComputingMethodologies_ARTIFICIALINTELLIGENCE
researchProduct

Identifying individuality and variability in team tactics by means of statistical shape analysis and multilayer perceptrons.

2012

Abstract Offensive and defensive systems of play represent important aspects of team sports. They include the players’ positions at certain situations during a match, i.e., when players have to be on specific positions on the court. Patterns of play emerge based on the formations of the players on the court. Recognition of these patterns is important to react adequately and to adjust own strategies to the opponent. Furthermore, the ability to apply variable patterns of play seems to be promising since they make it harder for the opponent to adjust. The purpose of this study is to identify different team tactical patterns in volleyball and to analyze differences in variability. Overall 120 s…

Competitive BehaviorOperations researchComputer scienceBiophysicsVideo RecordingExperimental and Cognitive PsychologyAthletic PerformanceYoung AdultOrder (exchange)OrientationWorld championshipComputer GraphicsImage Processing Computer-AssistedHumansOrthopedics and Sports MedicineCooperative BehaviorKinesthesisArtificial neural networkbusiness.industryStatistical shape analysisOffensiveGeneral MedicineAdversaryPerceptronBiomechanical PhenomenaVariable (computer science)VolleyballFemaleArtificial intelligenceNeural Networks ComputerbusinessAlgorithmsHuman movement science
researchProduct

MSS: A Multi-Level Data Placement Scheme for Data Survival in Wireless Sensor Networks

2009

In recently popularized unattended wireless sensor networks, sensed data are stored locally or some designated nodes for a long term and retrieved sometime by collectors on demand. Such data may be delete or modified as sensor nodes are always exposed to risks such as random failure and mobile adversary. To maximize the data survival, we propose a secure and efficient scheme - MSS. MSS makes use of hopbounded computational secret sharing to achieve fault tolerance and compromise resilience, and takes advantages of multi-level secret sharing to mitigate communication overhead and improve overall security. MSS has the most advantages in terms of security and efficiency among presented schemes…

Computer sciencebusiness.industryDistributed computingDistributed data storeOverhead (computing)Fault toleranceAdversarybusinessResilience (network)Wireless sensor networkSecret sharingComputer networkTerm (time)2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
researchProduct

Näkemys oikeudenmukaisuudesta ja kihlakunnantuomarin viraltapano 1700-luvun puolivälin Vanhassa Suomessa

2021

Sven Johan Östring hoiti Vanhassa Suomessa sijainneen Savonlinnan tuomiokunnan kihlakunnantuomarin virkaa reilun vuosikymmen ajan keväästä 1747 kesään 1760. Kihlakunnantuomarin ja tuomiokunnan rahvaan välit kärjistyivät 1750-luvun lopulla talonpoikien valittaessa toistuvasti tuomari Östringin väärinkäytöksistä. Talonpoikien mukaan kihlakunnantuomari Östring oli heidän vihamiehensä. Artikkelissa kysytään, miten virkavirhevalitusprosessit etenivät ja mitkä syyt johtivat lopulta kihlakunnantuomarin viraltapanoon. Kihlakunnantuomari Östringin väärinkäytökset olivat luonteeltaan pääasiassa taloudellisia. Valituksissa korostui kuitenkin taloudellisia menetyksiä vahvemmin talonpoikien näkemys oike…

CorruptionViranhoitoväärinkäytöksethenkilöhistoriamedia_common.quotation_subjecthyvä hallintoHistory (General)Economic JusticeDismissalPolitical scienceDD1-2009mikrohistoriavirkavirheethallintohistoriaVanha SuomioikeuslaitosVertaisarvioitu artikkelimedia_commonJurisdictionSavonlinnan tuomiokuntaÖstring Sven JohanAdversaryoikeudenmukaisuusLawRhetorickorruptiokihlakunnantuomaritHistory (General) and history of Europejulkinen hallinto1700-luku
researchProduct

The “corporealization” of the nation: notions of the unclean and viscosity in the nationalist discourse of Spanish fascism

2017

ABSTRACTThe present article focuses on the particular case of the nationalist discourse of Spanish fascism during the Spanish Civil War and the immediate postwar period (1936–1941), in order to explore one specific aspect of it: the characterization of the enemy Republican nation that was to be fought against as unclean and viscous or sticky. The aim here is to analyse what meanings these references possessed and what they can tell us about the general processes of construction of discourses of identity. For this purpose, use is made of certain propositions developed by sociology and anthropology, as a basis upon which to develop the hypothesis that the use of the aforementioned references …

Cultural StudiesHistory060101 anthropology050402 sociologyAbsoluteness05 social sciencesIdentity (social science)Gender studies06 humanities and the artsAdversaryNationalismSpanish Civil War0504 sociologyAesthetics0601 history and archaeologySociologyMechanism (sociology)Order (virtue)Period (music)Journal of Spanish Cultural Studies
researchProduct

Reverse-Safe Text Indexing

2021

We introduce the notion of reverse-safe data structures. These are data structures that prevent the reconstruction of the data they encode (i.e., they cannot be easily reversed). A data structure D is called z - reverse-safe when there exist at least z datasets with the same set of answers as the ones stored by D . The main challenge is to ensure that D stores as many answers to useful queries as possible, is constructed efficiently, and has size close to the size of the original dataset it encodes. Given a text of length n and an integer z , we propose an algorithm that constructs a z -reverse-safe data structure ( z -RSDS) that has size O(n) and answers decision and counting pattern matc…

Data structuresComputer scienceSuffix treesuffix tree0102 computer and information sciences02 engineering and technologytext indexing01 natural sciencesTheoretical Computer Sciencelaw.inventionSet (abstract data type)law020204 information systems0202 electrical engineering electronic engineering information engineeringPattern matchingdata privacySettore INF/01 - InformaticaSearch engine indexingdata privacy; Data structures; pattern matching; suffix tree; text indexingData structureMatrix multiplicationpattern matching010201 computation theory & mathematicsData structureAlgorithmAdversary modelInteger (computer science)ACM Journal of Experimental Algorithmics
researchProduct

Human Security versus Human Development - Behavioristic Approach

2016

Abstract Recent terrorist attacks in Brussels, Paris and Istanbul, are shaking a world bewildered of daily fear of violence, while the contemporary consumer has to deal with the “new wars” emerging in the context of the current socio-economic and political context. The issue is especially thorny since, most of the times, the “enemy” the citizens must face is unknown, not only when it comes to terrorist attacks, but also when dealing with the question of the “enemy” in foods purchased for consumption (food security) or the security of personal data when accessing and using the Internet (cyber security). Consequently, this paper attempts to highlight the way in which the safety and security n…

EntrepreneurshipFood securityHF5001-6182Social Psychologybusiness.industryEconomics Econometrics and Finance (miscellaneous)Internet privacyAdvertisingAdversaryperceived riskhuman developmenthuman securityTerrorismSecurity through obscurityEconomicsBusiness Management and Accounting (miscellaneous)New warsBusinessThe InternetbusinessHuman securityStudies in Business and Economics
researchProduct