Results 11 to 20 of about 12,055 (133)

Succession of hide–seek and pursuit–evasion at heterogeneous locations [PDF]

open access: yesJournal of The Royal Society Interface, 2014
Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit–escape.
Gal, Shmuel, Casas, Jérome
openaire   +2 more sources

Investigating the effect of knowledge hiding behaviors on employee silence and organizational deviant behaviors with the mediating role of psychological contract breach (Case study: Large Taxpayers Unit) [PDF]

open access: yesمدیریت راهبردی دانش سازمانی, 2023
The purpose of this research is to investigate the effect of knowledge hiding behaviors on employees' silence and organizational deviant behaviors with the mediating role of psychological contract breach.
Fatemeh Karimi jafari   +2 more
doaj   +2 more sources

Un análisis bibliométrico sobre ocultar conocimiento y organizaciones de investigación, 2012-2023

open access: yesGECONTEC: Revista Internacional de Gestión del Conocimiento y la Tecnología, 2023
El propósito del presente artículo es analizar la evolución de las investigaciones sobre ocultar conocimiento (knowledge-hiding), por cuanto consideramos que puede tratarse de una situación más común que la esperada de compartir conocimiento (knowledge ...
Federico Iriarte Ahon   +1 more
doaj   +3 more sources

Hiding from intracellular pattern recognition receptors, a passive strategy of flavivirus immune evasion [PDF]

open access: yesVirulence, 2011
Tick-borne encephalitis virus (TBEV) is a medically important flavivirus in Europe and Asia, causing meningitis and encephalitis in thousands of people annually. Despite its relevance for public health, the interaction of TBEV with the type I interferon (IFN) system is poorly characterized.
Anna K, Overby, Friedemann, Weber
openaire   +2 more sources

Gregarious Behaviour of Evasive Prey [PDF]

open access: yes, 2004
Lecture on the first SFB/TR 15 meeting, Gummersbach, July, 18 - 20, 2004We model the formation of a herd as a game between a predator and a prey population.
Eshel, Ilan   +2 more
core   +3 more sources

Research on Influencing Factors of Knowledge Hiding Behavior in Socialized Q&A Communities: Taking Zhihu as an Example

open access: yesComplexity, 2022
With the normalization of epidemic prevention and control, the expression of the public’s demand for health information on online platforms continues to increase, while knowledge hiding behavior has seriously hindered the communication and dissemination ...
Wen-Zhu Li   +3 more
doaj   +1 more source

Review of Adaptations of Velvet Ants (Hymenoptera: Mutillidae) [PDF]

open access: yes, 2017
Mutillid wasps are active and conspicuous insects, but their interactions with each other and with other animals are seldom observed. Mostly indirect evidence is used to postulate that an array of traits represents adaptations to exploit ground-nesting ...
Deyrup, Mark
core   +2 more sources

Hiding in Plain Sight: Differential Privacy Noise Exploitation for Evasion-Resilient Localized Poisoning Attacks in Multiagent Reinforcement Learning

open access: yes2023 International Conference on Machine Learning and Cybernetics (ICMLC), 2023
6 pages, 4 figures, Published in the proceeding of the ICMLC 2023, 9-11 July 2023, The University of Adelaide, Adelaide ...
Hossain, Md Tamjid, La, Hung
openaire   +2 more sources

Development and validation of the Spanish hazard perception test [PDF]

open access: yes, 2014
Objective: The aim of the current study is to develop and obtain validity evidence for a Hazard Perception test suitable for the Spanish driving population.
Benítez, I   +7 more
core   +1 more source

Linking good counter-knowledge with bad counter knowledge: the impact of evasive knowledge hiding and defensive reasoning

open access: yesJournal of Knowledge Management, 2021
Purpose Counter-knowledge is knowledge learned from unverified sources and can be classified as good (i.e. harmful, for instance, funny jokes) or bad (for example, lies to manipulate others’ decisions). The purpose of this study is to analyse the relationship between these two elements and on the possible reactions they can induce on people and ...
Cegarra-Navarro J. -G.   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy