Results 61 to 70 of about 5,088 (260)

Faithful men and false women: Love‐suicide in early modern English popular print

open access: yesGender &History, EarlyView.
Abstract This article explores the representation of suicide committed for love in English popular print in the seventeenth and early eighteenth centuries. It shows how, within ballads and pamphlets, suicide resulting from failed courtship was often portrayed as romantic and an expression of devotion.
Imogen Knox
wiley   +1 more source

Advances in Anti-Deception Jamming Strategies for Radar Systems: A Survey [PDF]

open access: yesarXiv
Deception jamming has long been a significant threat to radar systems, interfering with search, acquisition, and tracking by introducing false information that diverts attention from the targets of interest. As deception strategies become more sophisticated, the vulnerability of radar systems to these attacks continues to escalate.
arxiv  

A Smithian Political Economy Approach for the Competition Law of the 21st Century

open access: yesThe Modern Law Review, EarlyView.
This study aims to show how a Smithian political economy approach could assist competition law in addressing the challenges of the 21st‐century economy. We revisit Smith's Wealth of Nations to provide a more nuanced understanding of his views, contrasting them with the prevailing libertarian interpretation called here ‘Chicago Smith’.
Stavros Makris
wiley   +1 more source

The Omissions Doctrine after Tindall v Chief Constable of Thames Valley Police

open access: yesThe Modern Law Review, EarlyView.
In tort law, liability is generally not imposed for failing to confer a benefit on another person. This is commonly referred to as the omissions doctrine. In Tindall v Chief Constable of Thames Valley Police, the UK Supreme Court elucidated the scope of this doctrine.
Eleni Katsampouka
wiley   +1 more source

Mitigation of Radar Range Deception Jamming Using Random Finite Sets [PDF]

open access: yesarXiv
This paper presents a radar target tracking framework for addressing main-beam range deception jamming attacks using random finite sets (RFSs). Our system handles false alarms and detections with false range information through multiple hypothesis tracking (MHT) to resolve data association uncertainties.
arxiv  

Modeling and Analysis of Leaky Deception using Signaling Games with Evidence [PDF]

open access: yesarXiv, 2018
Deception plays critical roles in economics and technology, especially in emerging interactions in cyberspace. Holistic models of deception are needed in order to analyze interactions and to design mechanisms that improve them. Game theory provides such models. In particular, existing work models deception using signaling games.
arxiv  

Home - About - Disclaimer - Privacy