Results 11 to 20 of about 810,462 (294)
Business strategy and earnings quality [PDF]
: Using the Miles and Snow (1978) strategy typology, this study investigates whether business strategy is associated with the quality of reported earnings. In a sample of U.S.
Muhammad Nurul Houqe +2 more
core +1 more source
The last decade has seen an explosion of interest in the possibility of suffering in nonhumans, including animals only very distantly related to us, as well as artificial intelligence systems. Much of this research takes a stance that has come to be known as “sentientism”—that is, that a capacity to have negative or positive feelings is necessary (and,
Walter Veit, Heather Browning
openaire +3 more sources
Quasi-regular sequences and optimal schedules for security games [PDF]
We study security games in which a defender commits to a mixed strategy for protecting a finite set of targets of different values. An attacker, knowing the defender's strategy, chooses which target to attack and for how long. If the attacker spends time
Kempe, David +2 more
core +3 more sources
The Impact of Conventional Force Reductions on Strategic Deterrence: A Game-Theoretic Analysis [PDF]
Many game-theoretic analyses of deterrence confirm the commonsense view that what determines whether a defender can effectively deter a challenger from an unwanted action is (1) the challenger’s perception of the level of punishment that the defender ...
Kilgour, D. Marc, Zagare, Frank C.
core +2 more sources
CURRENT ISSUES RELATING TO THE DEFENDER’S STATUS IN CRIMINAL PROCEEDINGS IN MODERN RUSSIA
The current challenge for the Russian Federation is the steady implementation of the principles of criminal procedure. In this connection, the defender’s legal status arouses the interest of the scientific community of processualists and leads to the ...
Lifanova Marina Vladislavovna
doaj +1 more source
An Evasion and Counter-Evasion Study in Malicious Websites Detection [PDF]
Malicious websites are a major cyber attack vector, and effective detection of them is an important cyber defense task. The main defense paradigm in this regard is that the defender uses some kind of machine learning algorithms to train a detection model,
Xu, Li +3 more
core +2 more sources
Diachronic analysis application for the detection of soccer performance standards: a case study
The purpose of this study is to analyse the interactions established by Gerard Piqué, one of the world’s top defenders, within the general context of the team.
Maneiro R, Amatria M, Anguera MT
doaj +1 more source
Involvement Of A Forensic Expert By A Defense Counsel During Pre-Trial Investigation
Ensuring equality between parties and adhering to the adversarial principle is crucial, necessitating the availability of all procedural mechanisms to observe the rights and legitimate interests of both the defense counsel and the prosecution. Given the
Mykola Kolomoitsev
doaj +1 more source
Despite recent advancements in computationally detecting fake news, we argue that a critical missing piece be the explainability of such detection--i.e., why a particular piece of news is detected as fake--and propose to exploit rich information in users' comments on social media to infer the authenticity of news.
Limeng Cui +4 more
openaire +3 more sources
The criminal legal aid in China
УДК 347.965The subject of the article is the criminal legal aid in China.The main goal of this work is to introduce the current state of legal aid in criminal cases in China to Russian scholars and legal professionals.Results. Criminal Legal Aid in China
L. Changhai, V. Sonin
doaj +1 more source

