Results 161 to 170 of about 62,609 (209)
Cybersecurity as it relates to perfusion. [PDF]
Lung K.
europepmc +1 more source
Regulatory barriers to US-China collaboration for generative AI development in genomic research. [PDF]
Wang Z, Gregg B, Du L.
europepmc +1 more source
Enhancing the design of voting advice applications with BERT language model. [PDF]
Buryakov D +3 more
europepmc +1 more source
We consider a multimarket framework where a set of firms compete on two interrelated oligopolistic markets. Prior to competing in these markets, firms can spy on others in order to increase the quality of their product. We characterize the equilibrium espionage networks and networks that maximize social welfare under the most interesting scenario of ...
Pascal Billand +3 more
openaire +3 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2023
A concise introduction to the history and methods of espionage, illustrated by spy stories from antiquity to today's high-tech world. Espionage is one of the most secret of human activities. It is also, as the popularity of spy stories suggests, one of the most intriguing.
openaire +2 more sources
A concise introduction to the history and methods of espionage, illustrated by spy stories from antiquity to today's high-tech world. Espionage is one of the most secret of human activities. It is also, as the popularity of spy stories suggests, one of the most intriguing.
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Eilon Solan, Leeat Yariv
openaire +3 more sources
Social Philosophy and Policy, 2004
In 1995 the United States National Security Agency (NSA), the Central Intelligence Agency (CIA), and the Federal Bureau of Investigation (FBI) made public the story of a forty-year American intelligence operation code-named Venona. Shortly after the Nazi-Soviet Pact in 1939, American military intelligence had ordered companies that were sending ...
openaire +1 more source
In 1995 the United States National Security Agency (NSA), the Central Intelligence Agency (CIA), and the Federal Bureau of Investigation (FBI) made public the story of a forty-year American intelligence operation code-named Venona. Shortly after the Nazi-Soviet Pact in 1939, American military intelligence had ordered companies that were sending ...
openaire +1 more source

