890 resultados para Game on circle


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article is a response to an article by Ray Mackay (1996) which constitutes an attack on stylistic analysis in general, and the writings of the above authors and Ron Carter in particular. Mackay's article (in Language and Communication) accuses stylistics of 'scientificness' and claims that its attempt to provide objective analyses of literary texts is futile.1 We suggest that Mackay has misrepresented what stylisticians have said about objectivity, and that his understanding of objectivity, science and the nature of text-interpretative argument is seriously flawed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A new bargaining set based on notions of both internal and external stability is developed in the context of endogenous coalition formation. It allows to make an explicit distinction between within-group and outside-group deviation options. This type of distinction is not present in current bargaining sets. For the class of monotonic proper simple games, the outcomes in the bargaining set are characterized. Furthermore, it is shown that the bargaining set of any homogeneous weighted majority game contains an outcome for which the underlying coalition structure consists of a minimal winning coalition and its complement.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Agonistic interactions between animals are often settled by the use of repeated signals which advertise the resource-holding potential of the sender. According to the sequential assessment game this repetition increases the accuracy with which receivers may assess the signal, but under the cumulative assessment model the repeated performances accumulate to give a signal of stamina. These models may be distinguished by the temporal pattern of signalling they predict and by the decision rules used by the contestants. Hermit crabs engage in shell fights over possession of the gastropod shells that they inhabit. During these interactions the two roles of signaller and receiver may be examined separately because they are fixed for the duration of the encounter. Attackers rap their shell against that of the defender in a series of bouts whereas defenders remain tightly withdrawn into their shells for the duration of the contest. At the end of a fight the attacker may evict the defender from its shell or decide to give up without first effecting an eviction; the decision for defenders is either to maintain a grip on its shell or to release the shell and allow itself to be evicted. We manipulated fatigue levels separately for attackers and defenders, by varying the oxygen concentration of the water that they are held in prior to fighting, and examined the effects that this has on the likelihood of each decision and on the temporal pattern of rapping. We show that the vigour of rapping and the likelihood of eviction are reduced when the attacker is subjected to low oxygen but that this treatment has no effect on rates of eviction when applied to defenders. We conclude that defenders compare the vigour of rapping with an absolute threshold rather than with a relative threshold when making their decision. The data are compatible with the cumulative assessment model and with the idea that shell rapping signals the stamina of attackers, but do not fit the predictions of the sequential assessment game.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The paper presents a simple game-theoretic model of two Internet service providers (ISPs), drawn from a larger set consisting of Tiers-1 and -2 ISPs, who choose between peering and transit agreements. The study focuses on the costs of interconnection taking into account traffic imbalances. The analysis suggests that if the traffic flows and the costs of interconnection are fairly shared, the provider's peer, otherwise they choose transit. Moreover, the joint profits are maximized under the transit arrangement. Published by Elsevier Ltd.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We present the results of a 10.5-yr, volume-limited (28-Mpc) search for supernova (SN) progenitor stars. In doing so we compile all SNe discovered within this volume (132, of which 27 per cent are Type Ia) and determine the relative rates of each subtype from literature studies. The core-collapse SNe break down into 59 per cent II-P and 29 per cent Ib/c, with the remainder being IIb (5 per cent), IIn (4 per cent) and II-L (3 per cent). There have been 20 II-P SNe with high-quality optical or near-infrared pre-explosion images that allow a meaningful search for the progenitor stars. In five cases they are clearly red supergiants, one case is unconstrained, two fall on compact coeval star clusters and the other twelve have no progenitor detected. We review and update all the available data for the host galaxies and SN environments (distance, metallicity and extinction) and determine masses and upper mass estimates for these 20 progenitor stars using the STARS stellar evolutionary code and a single consistent homogeneous method. A maximum likelihood calculation suggests that the minimum stellar mass for a Type II-P to form is m(min) = 8.5(-1.5)(+1) M-circle dot and the maximum mass for II-P progenitors is m(max) = 16.5 +/- 1.5 M-circle dot, assuming a Salpeter initial mass function holds for the progenitor population (in the range Gamma = -1.35(-0.7)(+0.3)). The minimum mass is consistent with current estimates for the upper limit to white dwarf progenitor masses, but the maximum mass does not appear consistent with massive star populations in Local Group galaxies. Red supergiants in the Local Group have masses up to 25 M-circle dot and the minimum mass to produce a Wolf-Rayet star in single star evolution (between solar and LMC metallicity) is similarly 25-30 M-circle dot. The reason we have not detected any high-mass red supergiant progenitors above 17 M-circle dot is unclear, but we estimate that it is statistically significant at 2.4 sigma confidence. Two simple reasons for this could be that we have systematically underestimated the progenitor masses due to dust extinction or that stars between 17-25 M-circle dot produce other kinds of SNe which are not II-P. We discuss these possibilities and find that neither provides a satisfactory solution. We term this discrepancy the 'red supergiant problem' and speculate that these stars could have core masses high enough to form black holes and SNe which are too faint to have been detected. We compare the Ni-56 masses ejected in the SNe to the progenitor mass estimates and find that low-luminosity SNe with low Ni-56 production are most likely to arise from explosions of low-mass progenitors near the mass threshold that can produce a core-collapse.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the digital age, the hyperspace of virtual reality systems stands out as a new spatial notion creating a parallel world to the space we live in. In this alternative realm, the body transforms into a hyperbody, and begins to follow the white rabbit. Not only in real world but also in the Matrix world. The Matrix project of Andy and Larry Wachowski started with a feature film released in 1999. However, The Matrix is not only a film (trilogy). It is a concept, a universe that brings real space and hyperspace together. It is a world represented not only in science fiction films but also in The Animatrix that includes nine animated Matrix films directed by Peter Chung, Andy Jones, Yoshiaki Kawajiri and others, four of which are written by the Wachowskis. The same universe is used in Enter the Matrix, a digital game whose script was written and directed by the brothers and a comic book, The Matrix Comics, which includes twelve different stories by artists like Neil Gaiman and Goef Darrow. The Wachowskis played an active role in the creation and realization of all these “products” of different media. The comic book came last (November 2003), however it is possible to argue that everything came out of comics – the storyboards of the original film. After all the Wachowskis have a background in comics.

In this study, I will focus on the formal analysis of the science fiction world of The Matrix - as a representation of hyperspace - in different media, feature film, animated film, digital game and comic book, focusing on diverse forms of space that come into being as a result of medium differences. To unfold the different formal characters of film, animation, game and comics, concepts and features including framing, flattening, continuity, movement, montage, sound/text, light and color will be discussed. An analysis of these products will help to open up a discussion on the relation of form, media and representation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The pre-explosion observations of the Type II-P supernovae 2006my, 2006ov and 2004et are re-analysed. In the cases of supernovae 2006my and 2006ov we argue that the published candidate progenitors are not coincident with their respective supernova sites in pre-explosion Hubble Space Telescope observations. We therefore derive upper luminosity and mass limits for the unseen progenitors of both these supernovae, assuming they are red supergiants: 2006my (log L/L-circle dot = 4.51; m

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We identify a source coincident with SN 2009kr in Hubble Space Telescope pre-explosion images. The object appears to be a single point source with an intrinsic color V - I = 1.1 +/- 0.25 and M-V = -7.6 +/- 0.6. If this is a single star, it would be a yellow supergiant of log L/L-circle dot similar to 5.1 and a mass of 15(-4)(+5) M-circle dot. The spatial resolution does not allow us yet to definitively determine if the progenitor object is a single star, a binary system, or a compact cluster. We show that the early light curve is similar to a Type IIL SN, but the prominent H alpha P-Cygni profiles and the signature of the end of a recombination phase are reminiscent of a Type IIP. The evolution of the expanding ejecta will play an important role in understanding the progenitor object.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Lead is highly toxic to animals. Humans eating game killed using lead ammunition generally avoid swallowing shot or bullets and dietary lead exposure from this source has been considered low. Recent evidence illustrates that lead bullets fragment on impact, leaving small lead particles widely distributed in game tissues. Our paper asks whether lead gunshot pellets also fragment upon impact, and whether lead derived from spent gunshot and bullets in the tissues of game animals could pose a threat to human health.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A web-service is a remote computational facility which is made available for general use by means of the internet. An orchestration is a multi-threaded computation which invokes remote services. In this paper game theory is used to analyse the behaviour of orchestration evaluations when underlying web-services are unreliable. Uncertainty profiles are proposed as a means of defining bounds on the number of service failures that can be expected during an orchestration evaluation. An uncertainty profile describes a strategic situation that can be analyzed using a zero-sum angel-daemon game with two competing players: an angel a whose objective is to minimize damage to an orchestration and a daemon d who acts in a destructive fashion. An uncertainty profile is assessed using the value of its angel daemon game. It is shown that uncertainty profiles form a partial order which is monotonic with respect to assessment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Most special issues on Roma minorities want to alert readers to the devastating consequences of racist public attitudes and misdirected public policy. Here we don't shy away from such issues, but we also want to challenge our own scholarship and ask some fundamental questions about how we, as academics, are approaching such research. In this introduction the context of the special issue is explored, both in terms of the historic backdrop of an expanding European Union and the academic theoretical framework of minority integration. Major critical questioning – such as broader questions around migration, race and ethnicity discourses – are still lacking when it comes to research on or with Roma minorities. Our main aim is to move debates on from continually describing who Roma people are and what they are doing, to questioning: who defines who is Roma, when and why? What happens in policy-making, research, everyday interactions? This approach sees an understanding of recognition, representations and power dynamics as fundamental to understanding the positionings of minorities who can also be marginalised or feel disenfranchised. This introduction to the special issue highlights the importance of deeply conceptualising issues around minority integration alongside empirical knowledge of how Roma identities become implicated in and through different modalities of mobilisation. Contributions to this special issue speak to debates in minority politics and identity studies along with migration and race/ethnicity discourses. This indicates that the experiences of, and discourses surrounding Roma minorities reflect the fundamental concerns of social science research about identity, ethnicity, cohesion and change.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

On formal credit markets, access to formal credit and reasonable credit terms of smallholder farmers
in rural sub-Saharan Africa is limited due to adverse selection. Financial institutions operating in
rural areas often cannot distinguish between borrowers (farmers) that are creditworthy and those that
are not, thus, allocate limited resource to agriculture to reduce credit risk. In the presence of limited business quality signaling by smallholder farmers, financial institutions shall demand for collateral and/or offer unfavorable contract terms. Moreover, agricultural productivity of rural sub-Saharan
Africa, dominated by subsistence or small-scale farmers, is also negatively impacted by the adverse
effect of climate change. A strategy that may make the farming practices of smallholder farmer’s
climate resilient and profitable may also improve smallholder farmer's access to formal credit. This
study investigates to what extent participating in ecosystem and extension services (EES) programs
signals business quality of smallholders, thus granting them credit accessibility. We collected data
on 210 smallholder farmers in 2013, comprising farmers that receive payments for ecosystem
services (PES) and farm management training from the International Small Group Tree Planting
Program (TIST) Kenya to test the aforementioned theory empirically. We use game theory,
particularly a screening and sorting model, to illustrate the prospects for farmers with EES to access
formal credit and to improve their credit terms given that they receive PES and banking services
training. Furthermore, the PES’ long term duration (10 – 30 years) generates stable cash-flow which
may be perceived as collateral substitute. Results suggest that smallholder farmers in the TIST
program were less likely to be credit constraint compared to non-TIST farmers. Distance to market,
education, livestock and farm income are factors that determine access to credit from microfinance
institutions in rural Kenya. Amongst farmers that have obtained loans, those keeping business records
enjoy more favorable formal credit conditions. These farmers were observed to pay ca. 5 percent less
interest rate in microfinance charges. For TIST farmers, this type of farm management practices may
be attributed to the banking services and other training they receive within the program. While the
availability of classical collateral (farmlands) and PES may reduce interest rate, the latter was found
to be statistically insignificant. This research underlines the importance of an effective extension
services in rural areas of developing countries and the need to improve gains from conservation
agriculture and ensuing PES. The benefits associated with EES and PES may encompass agricultural
financing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Security is a critical concern around the world. Since resources for security are always limited, lots of interest have arisen in using game theory to handle security resource allocation problems. However, most of the existing work does not address adequately how a defender chooses his optimal strategy in a game with absent, inaccurate, uncertain, and even ambiguous strategy profiles' payoffs. To address this issue, we propose a general framework of security games under ambiguities based on Dempster-Shafer theory and the ambiguity aversion principle of minimax regret. Then, we reveal some properties of this framework. Also, we present two methods to reduce the influence of complete ignorance. Our investigation shows that this new framework is better in handling security resource allocation problems under ambiguities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Threat prevention with limited security resources is a challenging problem. An optimal strategy is to eectively predict attackers' targets (or goals) based on current available information, and use such predictions to prevent (or disrupt) their planned attacks. In this paper, we propose a game-theoretic framework to address this challenge which encompasses the following three elements. First, we design a method to analyze an attacker's types in order to determine the most plausible type of an attacker. Second, we propose an approach to predict possible targets of an attack and the course of actions that the attackers may take even when the attackers' types are ambiguous. Third, a game-theoretic based strategy is developed to determine the best protection actions for defenders (security resources).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Game-theoretic security resource allocation problems have generated significant interest in the area of designing and developing security systems. These approaches traditionally utilize the Stackelberg game model for security resource scheduling in order to improve the protection of critical assets. The basic assumption in Stackelberg games is that a defender will act first, then an attacker will choose their best response after observing the defender’s strategy commitment (e.g., protecting a specific asset). Thus, it requires an attacker’s full or partial observation of a defender’s strategy. This assumption is unrealistic in real-time threat recognition and prevention. In this paper, we propose a new solution concept (i.e., a method to predict how a game will be played) for deriving the defender’s optimal strategy based on the principle of acceptable costs of minimax regret. Moreover, we demonstrate the advantages of this solution concept by analyzing its properties.