954 resultados para attack detection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this note we characterize optimal punishments with detection lags when the market consists of n oligopolistic firms. We extend a previous note by Colombo and Labrecciosa (2006) [Colombo, L., and Labrecciosa, P., 2006. Optimal punishments with detection lags. Economic Letters 92, 198-201] to show how in the presence of detection lags optimal punish- ments fail to restore cooperation also in markets with a low number of firms.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Validated by comparison with DNS, numerical database of turbulent channel flows is yielded by Large Eddy Simulation (LES). Three conventional techniques: uv quadrant 2, VITA and mu-level techniques for detecting turbulent bursts are applied to the identification of turbulent bursts. With a grouping parameter introduced by Bogard & Tiedemann (1986) or Luchik & Tiederman (1987), multiple ejections detected by these techniques which originate from a single burst can be grouped into a single-burst event. The results are compared with experimental results, showing that all techniques yield reasonable average burst period. However, uv quadrant 2 and mu-level are found to be superior to VITA in having large threshold-independent range.