Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Defensive game systems“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Defensive game systems" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Defensive game systems"
Wu, Wenhao, und Bing Bu. „Security Analysis for CBTC Systems under Attack–Defense Confrontation“. Electronics 8, Nr. 9 (05.09.2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Der volle Inhalt der QuelleMolik, Bartosz, Natalia Morgulec-Adamowicz, Jolanta Marszałek, Andrzej Kosmol, Izabela Rutkowska, Alicja Jakubicka, Ewelina Kaliszewska et al. „Evaluation of Game Performance in Elite Male Sitting Volleyball Players“. Adapted Physical Activity Quarterly 34, Nr. 2 (April 2017): 104–24. http://dx.doi.org/10.1123/apaq.2015-0028.
Der volle Inhalt der QuelleTian, Changjia, Varuna De Silva, Michael Caine und Steve Swanson. „Use of Machine Learning to Automate the Identification of Basketball Strategies Using Whole Team Player Tracking Data“. Applied Sciences 10, Nr. 1 (18.12.2019): 24. http://dx.doi.org/10.3390/app10010024.
Der volle Inhalt der QuelleGambarelli, Daniele, Gianfranco Gambarelli und Dries Goossens. „Offensive or defensive play in soccer: a game-theoretical approach“. Journal of Quantitative Analysis in Sports 15, Nr. 4 (25.10.2019): 261–69. http://dx.doi.org/10.1515/jqas-2017-0071.
Der volle Inhalt der QuelleZhang, Cevin, Karin Pukk Härenstam, Sebastiaan Meijer und Adam S. Darwich. „Serious Gaming of Logistics Management in Pediatric Emergency Medicine“. International Journal of Serious Games 7, Nr. 1 (02.03.2020): 47–77. http://dx.doi.org/10.17083/ijsg.v7i1.334.
Der volle Inhalt der QuellePizarro, David, Alba Práxedes, Bruno Travassos, Bruno Gonçalves und Alberto Moreno. „How Informational Constraints for Decision-Making on Passing, Dribbling and Shooting Change With the Manipulation of Small-Sided Games Changes in Futsal“. Perceptual and Motor Skills 128, Nr. 4 (22.05.2021): 1684–711. http://dx.doi.org/10.1177/00315125211016350.
Der volle Inhalt der QuelleGuedea Delgado, Julio Cesar, Raúl Josué Nájera Longoria, Oscar Núñez Enríquez, Ramón Candía Luján und Gabriel Gastélum Cuadras. „Sistemas tácticos y resultados de competición del Mundial de Fútbol Asociación de Rusia 2018.Tactical systems and matches results from the Football Association Worldcup Rusia 2018.“ Retos, Nr. 36 (06.06.2019): 503–9. http://dx.doi.org/10.47197/retos.v36i36.69296.
Der volle Inhalt der QuellePraça, Gibson Moreira, Hugo Folgado, André Gustavo Pereira de Andrade und Pablo Juan Greco. „Comportamento tático coletivo em Pequenos Jogos no Futebol: influência de jogadores adicionais“. Brazilian Journal of Kinanthropometry and Human Performance 18, Nr. 1 (16.03.2016): 62. http://dx.doi.org/10.5007/1980-0037.2016v18n1p62.
Der volle Inhalt der QuelleMontgomery, Paul G., David B. Pyne und Clare L. Minahan. „The Physical and Physiological Demands of Basketball Training and Competition“. International Journal of Sports Physiology and Performance 5, Nr. 1 (März 2010): 75–86. http://dx.doi.org/10.1123/ijspp.5.1.75.
Der volle Inhalt der QuelleZhang, Jing, Shifei Shen und Rui Yang. „The impacts of adaptive attacking and defending strategies on mitigation of intentional threats“. Kybernetes 39, Nr. 5 (15.06.2010): 825–37. http://dx.doi.org/10.1108/03684921011043279.
Der volle Inhalt der QuelleDissertationen zum Thema "Defensive game systems"
Guinto, Roi John. „Serious games for improved defense contracting“. Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90050.
Der volle Inhalt der QuelleCataloged from PDF version of thesis.
Includes bibliographical references (pages 85-88). Gameography: page 89.
Gaming has been explored as a research technique in complex systems to explore human interactions within technical domains. These so-called "serious games" are designed for purposes outside of pure entertainment and are intended to help researchers engage with qualitative data that focuses on human behavior. This thesis focuses on a research game called ColumBID which was designed for the Production in the Innovation Economy shipbuilding study. This game seeks to understand the negotiation process in defense contracting and is used to facilitate and record the participants' movement through the tradespace. From a game theory perspective, we analyzed the non-Pareto dominant movements through the tradespace and found that humans explore the space by sliding along fronts until they reach an optimal and then jumping to another front to negotiate another optimal point. The players then compare these optimal points to simplify the multi-variable optimization. We found that an 8% contract price improvement in the competitive case compared to the monopolistic case. This thesis recommends that serious research game design focus on questions about the process rather than the endgame optimization.
by Roi John Guinto.
S.M. in Technology and Policy
Christofer, Malmberg, und Phan Henrik. „Lindenmayer’s Defense: Generating projectile patterns in a video game environment using L-Systems“. Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20003.
Der volle Inhalt der QuelleEldosouky, Mahmoud Salama Abdelrahman A. „Security of Critical Cyber-Physical Systems: Fundamentals and Optimization“. Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.
Der volle Inhalt der QuelleDoctor of Philosophy
Cyber-physical systems (CPSs) have recently been used in many application domains because of their ability to integrate physical elements with a cyber layer allowing for sensing, monitoring, and remote controlling. This pervasive use of CPSs in different applications has brought forward new security challenges and threats. Malicious attacks can now leverage the connectivity of the cyber layer to launch remote attacks and cause damage to the physical components. Taking these threats into consideration, it became imperative to ensure the security of CPSs. Given that many CPSs provide critical services, for instance many critical infrastructure (CI) are CPSs such as smart girds and nuclear reactors; it is then inevitable to ensure that these critical CPSs can maintain proper operation. One key measure of the CPS’s functionality, is resilience which evaluates the ability of a CPS to deliver its designated service under potentially disruptive situations. In general, resilience measures a CPS’s ability to adapt or rapidly recover from disruptive events. Therefore, it is crucial for CPSs to be resilient in face of potential failures. To this end, the central goal of this dissertation is to develop novel analytical frameworks that can evaluate and improve security and resilience of CPSs. In these frameworks, cross-disciplinary tools are used from game theory, contract theory, and optimization to develop robust analytical solutions for security and resilience problems. In particular, these frameworks led to the following key contributions in cyber security: developing an analytical framework to mitigate the effects of GPS spoofing attacks against UAVs, introducing a game-theoretic moving target defense (MTD) framework to improve the cyber security, and securing data privacy in m-health Internet of Things (IoT) networks using a MTD cryptographic framework. In addition, the dissertation led to the following contributions in CI resilience: developing a general framework using Bayesian Networks to evaluate and improve the resilience of CIs against their components failure, introducing a contracttheoretic model to allocate resources to multiple connected CIs under complete and asymmetric information scenarios, providing a proactive plan to improve the resilience of transportation networks against flooding, and, finally, developing an environment-aware framework to deploy UAVs in disaster-areas
Luo, Yi. „DECISION MAKING UNDER UNCERTAINTY IN DYNAMIC MULTI-STAGE ATTACKER-DEFENDER GAMES“. Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/204331.
Der volle Inhalt der QuelleCampos, Simone Silva. „O jogo e os jogos: o jogo da leitura, o jogo de xadrez e a sanidade mental em A defesa Lujin, de Vladimir Nabokov“. Universidade do Estado do Rio de Janeiro, 2014. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=6936.
Der volle Inhalt der QuelleNo romance A defesa Lujin, de Vladimir Nabokov, publicado em russo em 1930, o texto procura levar o leitor a adotar processos mentais similares ao de um jogador de xadrez e de um esquizofrênico, características do personagem-título do romance. Delineiam-se as expectativas e circunstâncias de um ser de papel que se vê jogando um xadrez em que também é peça e traçam-se paralelos com as expectativas e circunstâncias do leitor perante esse texto literário. O prefácio de Nabokov à edição em inglês de 1964 é tomado como indício de um leitor e um autor implícitos que ele procura moldar. Para análise dos elementos textuais e níveis de abstração mental envolvidos, recorre-se à estética da recepção de Wolfgang Iser e a diversas ideias do psiquiatra e etnólogo Gregory Bateson, entre elas o conceito de duplo vínculo, com atenção às distinções entre mapa/território e play/game. Um duplo duplo vínculo é perpetrado na interação leitor-texto: 1) o leitor é convidado a sentir empatia pela situação do personagem Lujin e a considerá-lo lúcido e louco ao mesmo tempo; e 2) o leitor é colocado como uma instância pseudo-transcendental incapaz de comunicação com a instância inferior (Lujin), gerando uma angústia diretamente relacionável ao seu envolvimento com a ficção, replicando de certa forma a loucura de Lujin. A sinestesia do personagem Lujin é identificada como um dos elementos do texto capaz de recriar a experiência de jogar xadrez até para quem não aprecia o jogo. Analisa-se a conexão entre a esquizofrenia ficcional do personagem Lujin e a visão batesoniana do alcoolismo
In Vladimir Nabokovs novel, The Luzhin Defense, published in Russian in 1930, the text beckons the reader on to adopt mental processes similar to a chess players and a schizophrenic persons both traits of the novels title character. This character sees himself both as player and piece of an ongoing game of chess; his expectations and predicaments are traced in parallel to the readers own as he or she navigates the text. Nabokovs preface to the 1964 English edition is taken as an indication that he tries to shape both an implicit reader and an implicit author. In order to analyze the elements of the text and degrees of mental abstraction involved in this, we refer to Wolfgang Isers reader-response theory and also many of psychiatrist and ethnologist Gregory Batesons ideas, such as the double bind, with special regard to map vs. territory and play vs. game distinctions. A double double bind is built within the reader-text interplay as follows: 1) the reader is invited to feel empathy for Luzhins predicament and to regard him at once as sane and insane; and 2) the reader is posited as a pseudo-transcendental instance unable to communicate with his nether instance (Luzhin) in such a way that it brews a feeling of anxiety directly relatable to his or her engagement in the work of fiction, reproducing, in a way, Luzhins madness. Luzhins synesthesia is identified as one of the text elements with the ability to recreate the chess-playing experience even to readers who are not fond of the game. The connection between Luzhins fictional schizophrenia and Batesons views on alcoholism is analyzed
Růžek, Adam. „Využití taktických variant obranných herních systémů florbalových družstev v nejvyšších soutěžích České republiky a Finska“. Master's thesis, 2021. http://www.nusl.cz/ntk/nusl-446409.
Der volle Inhalt der QuelleLin, Hua-Chen, und 林華振. „Visual Strategy Analysis System for Basketball Game-Recognition of Offense and Defense Pattern“. Thesis, 2010. http://ndltd.ncl.edu.tw/handle/78298102674777739093.
Der volle Inhalt der Quelle國立東華大學
資訊工程學系
98
Recently, sport video analysis is a popular topic in the field of computer vision. We analyze the relative 2D locations of players, basketball, and basket to determine offense and defense patterns in a basketball video captured in a fixed view point. The paper can be divided to two parts. The first part is to find the 2D projected locations of players, ball and basket. The second part is to extract features to find out the changes of offense and defense patterns in a basketball game. With the help of the proposed system, audiences can realize the game matching strategy and more deep information that are missing in current basketball game broadcasting.
Mark, Hung Chuang, und 莊泓. „The Influences of Cross-Strait Relations on ROC’s Military Capability with Respect to Economic Growth and Defense Budget:The Application of Game Theory and System Dynamics“. Thesis, 2007. http://ndltd.ncl.edu.tw/handle/89854795885576228667.
Der volle Inhalt der Quelle國防管理學院
資源管理研究所
95
This study looks at the impact from the Cross-Strait economic relation to ROC's economic growth,and PRC's military threat.It's applied by game theory and system dynamics to evaluate the influences from the defense budget to ROC's military capability,and current situations.Meanwhile ,it provides correlative recommendations. According to the empirical analysis,if the tension of the Cross-Strait relation ceases both side to trade with each other,it will affect us more than the cease of the overseas trade;the cognition of PRC’s threats affects much higher than prior impacts.Besides, PRC’s purpose is to make us”not to fight”and”dare not to fight”,then ultimately causes our surrender without warfares.Due to such situations,we ROC ought not to overly depend upon the Mainland economically,and enforce our psychological reconstruction at the same time.Then we’ll not feel quite helpless to send PRC everything they ask.
Bücher zum Thema "Defensive game systems"
The Sicilian defense: Taimanov system. New York: Collier Books, 1989.
Den vollen Inhalt der Quelle findenSoltis, Andy. Black to play and win with 1-g6: A complete defensive system. 2. Aufl. Dallas, Tex: Chess Digest, 1993.
Den vollen Inhalt der Quelle findenJajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. New York, NY: Springer New York, 2013.
Den vollen Inhalt der Quelle findenSuper NES games secrets: For the super nintendo entertainment system. Rocklin, CA: Prima Pub., 1992.
Den vollen Inhalt der Quelle findenEddy, Andy. Super NES Games Secrets. Rocklin, CA: Prima Publishing, 1992.
Den vollen Inhalt der Quelle findenArnold, J. Douglas. Awesome Super Nintendo Secrets. Maui, USA: Sandwich Islands Publishing, 1992.
Den vollen Inhalt der Quelle findenSoltis, Andy. Black Defensive System For The Rest Of Your Chess Career. 2. Aufl. Chess Digest, 1997.
Den vollen Inhalt der Quelle findenDagger, Richard. Playing Fair with Punishment. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199388837.003.0007.
Der volle Inhalt der QuelleJajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup und X. Sean Wang. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.
Den vollen Inhalt der Quelle findenJajodia, Sushil, Anup K. Ghosh und V. S. Subrahmanian. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Defensive game systems"
Li, Nianyu, Mingyue Zhang, Eunsuk Kang und David Garlan. „Engineering Secure Self-Adaptive Systems with Bayesian Games“. In Fundamental Approaches to Software Engineering, 130–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_7.
Der volle Inhalt der QuelleAdnan, Mohd, Toa Yang, Sayekat Kumar Das und Tazeem Ahmad. „Utility of Game Theory in Defensive Wireless Sensor Networks (WSNs)“. In Advances in Intelligent Systems and Computing, 895–904. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5113-0_75.
Der volle Inhalt der QuellePradeep Kumar, K., und B. R. Prasad Babu. „DSMANET: Defensive Strategy of Routing Using Game Theory Approach for Mobile Adhoc Network“. In Advances in Intelligent Systems and Computing, 311–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91192-2_31.
Der volle Inhalt der QuelleLevitin, Gregory. „Optimizing Defense Strategies for Complex Multi-State Systems“. In Game Theoretic Risk Analysis of Security Threats, 33–64. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87767-9_3.
Der volle Inhalt der QuelleSun, Xueyan, Xiaowu Liu und Shuwen Zhang. „A Simplified Attack-Defense Game Model for NSSA“. In Wireless Algorithms, Systems, and Applications, 820–28. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21837-3_80.
Der volle Inhalt der QuelleRavishankar, Monica, D. Vijay Rao und C. R. S. Kumar. „Game Theory-Based Defense Mechanisms of Cyber Warfare“. In Advances in Intelligent Systems and Computing, 149–52. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8569-7_16.
Der volle Inhalt der QuelleKim, Song-Kyoo. „Enhanced Design of Stochastic Defense System with Mixed Game Strategies“. In Game Theory for Networking Applications, 107–17. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93058-9_7.
Der volle Inhalt der QuelleKumar, Bhupender, und Bubu Bhuyan. „Game Theoretical Defense Mechanism Against Bandwidth Based DDoS Attacks“. In Proceedings of the International Conference on Computing and Communication Systems, 601–13. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4084-8_58.
Der volle Inhalt der QuelleSimmons, Chris B., Sajjan G. Shiva, Harkeerat Singh Bedi und Vivek Shandilya. „ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy“. In Security and Privacy Protection in Information Processing Systems, 344–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_26.
Der volle Inhalt der QuelleTan, Tse Guan, Yung Nan Yong, Kim On Chin, Jason Teo und Rayner Alfred. „Automated Evaluation for AI Controllers in Tower Defense Game Using Genetic Algorithm“. In Soft Computing Applications and Intelligent Systems, 135–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40567-9_12.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Defensive game systems"
Garcia, Eloy, David W. Casbeer und Meir Pachter. „Escape Regions of the Active Target Defense Differential Game“. In ASME 2015 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/dscc2015-9628.
Der volle Inhalt der QuelleHe, Fei, Chiamaka Agwuegbo, Nageswara S. V. Rao und Chris Y. T. Ma. „A Sequential Game of Defense and Attack on an Interdependent System of Systems“. In 2018 International Conference on Information Fusion (FUSION). IEEE, 2018. http://dx.doi.org/10.23919/icif.2018.8455314.
Der volle Inhalt der QuelleZhang, Xiaoxiong, Kun Ding, Hui Zhang und Guoquan Jiang. „Incorporating risk preferences into a defense-attack game“. In 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2020. http://dx.doi.org/10.1109/smc42975.2020.9282870.
Der volle Inhalt der QuellePachter, Meir, David W. Casbeer und Eloy Garcia. „Linear Quadratic Formulation of the Target Defense Differential Game“. In 2019 International Conference on Unmanned Aircraft Systems (ICUAS). IEEE, 2019. http://dx.doi.org/10.1109/icuas.2019.8797892.
Der volle Inhalt der QuelleGao, Xiang, und Yue-Fei Zhu. „DDoS Defense Mechanism Analysis Based on Signaling Game Model“. In 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC). IEEE, 2013. http://dx.doi.org/10.1109/ihmsc.2013.105.
Der volle Inhalt der QuelleTurner, James D., und Brian P. Mann. „Sensitivity of Final Field Position to the Punt Initial Conditions in American Football“. In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-60235.
Der volle Inhalt der QuelleCarta, Federica, Diego Ros McDonnell und Pedro Enrique Collado Espejo. „El Castillo de La Atalaya (siglo XVIII), en Cartagena (Región de Murcia, España). Análisis formal y constructivo“. In FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11366.
Der volle Inhalt der QuelleXiong, Qiang, Wei-jun Zhong und Shu-e. Mei. „A signal game model on security defense of information system“. In 2011 IEEE 18th International Conference on Industrial Engineering and Engineering Management. IEEE, 2011. http://dx.doi.org/10.1109/icieem.2011.6035162.
Der volle Inhalt der QuelleLiang, Yu, und Donghua Qin. „A Bayesian Game Approach for Security Defense Strategy in WSN“. In 2nd International Conference on Computer Application and System Modeling. Paris, France: Atlantis Press, 2012. http://dx.doi.org/10.2991/iccasm.2012.275.
Der volle Inhalt der QuelleStrasser, Benjamin. „What's in a game: game-theoretic analysis for third party planning“. In Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2021, herausgegeben von Raja Suresh. SPIE, 2021. http://dx.doi.org/10.1117/12.2589560.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Defensive game systems"
Letchford, Joshua. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems. Office of Scientific and Technical Information (OSTI), September 2016. http://dx.doi.org/10.2172/1330190.
Der volle Inhalt der QuelleHoffman, Wyatt. AI and the Future of Cyber Competition. Center for Security and Emerging Technology, Januar 2021. http://dx.doi.org/10.51593/2020ca007.
Der volle Inhalt der Quelle