Results 11 to 20 of about 12,055 (133)
Succession of hide–seek and pursuit–evasion at heterogeneous locations [PDF]
Many interactions between searching agents and their elusive targets are composed of a succession of steps, whether in the context of immune systems, predation or counterterrorism. In the simplest case, a two-step process starts with a search-and-hide phase, also called a hide-and-seek phase, followed by a round of pursuit–escape.
Gal, Shmuel, Casas, Jérome
openaire +2 more sources
Investigating the effect of knowledge hiding behaviors on employee silence and organizational deviant behaviors with the mediating role of psychological contract breach (Case study: Large Taxpayers Unit) [PDF]
The purpose of this research is to investigate the effect of knowledge hiding behaviors on employees' silence and organizational deviant behaviors with the mediating role of psychological contract breach.
Fatemeh Karimi jafari +2 more
doaj +2 more sources
Un análisis bibliométrico sobre ocultar conocimiento y organizaciones de investigación, 2012-2023
El propósito del presente artículo es analizar la evolución de las investigaciones sobre ocultar conocimiento (knowledge-hiding), por cuanto consideramos que puede tratarse de una situación más común que la esperada de compartir conocimiento (knowledge ...
Federico Iriarte Ahon +1 more
doaj +3 more sources
Hiding from intracellular pattern recognition receptors, a passive strategy of flavivirus immune evasion [PDF]
Tick-borne encephalitis virus (TBEV) is a medically important flavivirus in Europe and Asia, causing meningitis and encephalitis in thousands of people annually. Despite its relevance for public health, the interaction of TBEV with the type I interferon (IFN) system is poorly characterized.
Anna K, Overby, Friedemann, Weber
openaire +2 more sources
Gregarious Behaviour of Evasive Prey [PDF]
Lecture on the first SFB/TR 15 meeting, Gummersbach, July, 18 - 20, 2004We model the formation of a herd as a game between a predator and a prey population.
Eshel, Ilan +2 more
core +3 more sources
With the normalization of epidemic prevention and control, the expression of the public’s demand for health information on online platforms continues to increase, while knowledge hiding behavior has seriously hindered the communication and dissemination ...
Wen-Zhu Li +3 more
doaj +1 more source
Review of Adaptations of Velvet Ants (Hymenoptera: Mutillidae) [PDF]
Mutillid wasps are active and conspicuous insects, but their interactions with each other and with other animals are seldom observed. Mostly indirect evidence is used to postulate that an array of traits represents adaptations to exploit ground-nesting ...
Deyrup, Mark
core +2 more sources
6 pages, 4 figures, Published in the proceeding of the ICMLC 2023, 9-11 July 2023, The University of Adelaide, Adelaide ...
Hossain, Md Tamjid, La, Hung
openaire +2 more sources
Development and validation of the Spanish hazard perception test [PDF]
Objective: The aim of the current study is to develop and obtain validity evidence for a Hazard Perception test suitable for the Spanish driving population.
Benítez, I +7 more
core +1 more source
Purpose Counter-knowledge is knowledge learned from unverified sources and can be classified as good (i.e. harmful, for instance, funny jokes) or bad (for example, lies to manipulate others’ decisions). The purpose of this study is to analyse the relationship between these two elements and on the possible reactions they can induce on people and ...
Cegarra-Navarro J. -G. +2 more
openaire +2 more sources

