Literatura académica sobre el tema "Defensive game systems"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Defensive game systems".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Defensive game systems"
Wu, Wenhao y Bing Bu. "Security Analysis for CBTC Systems under Attack–Defense Confrontation". Electronics 8, n.º 9 (5 de septiembre de 2019): 991. http://dx.doi.org/10.3390/electronics8090991.
Texto completoMolik, Bartosz, Natalia Morgulec-Adamowicz, Jolanta Marszałek, Andrzej Kosmol, Izabela Rutkowska, Alicja Jakubicka, Ewelina Kaliszewska et al. "Evaluation of Game Performance in Elite Male Sitting Volleyball Players". Adapted Physical Activity Quarterly 34, n.º 2 (abril de 2017): 104–24. http://dx.doi.org/10.1123/apaq.2015-0028.
Texto completoTian, Changjia, Varuna De Silva, Michael Caine y Steve Swanson. "Use of Machine Learning to Automate the Identification of Basketball Strategies Using Whole Team Player Tracking Data". Applied Sciences 10, n.º 1 (18 de diciembre de 2019): 24. http://dx.doi.org/10.3390/app10010024.
Texto completoGambarelli, Daniele, Gianfranco Gambarelli y Dries Goossens. "Offensive or defensive play in soccer: a game-theoretical approach". Journal of Quantitative Analysis in Sports 15, n.º 4 (25 de octubre de 2019): 261–69. http://dx.doi.org/10.1515/jqas-2017-0071.
Texto completoZhang, Cevin, Karin Pukk Härenstam, Sebastiaan Meijer y Adam S. Darwich. "Serious Gaming of Logistics Management in Pediatric Emergency Medicine". International Journal of Serious Games 7, n.º 1 (2 de marzo de 2020): 47–77. http://dx.doi.org/10.17083/ijsg.v7i1.334.
Texto completoPizarro, David, Alba Práxedes, Bruno Travassos, Bruno Gonçalves y Alberto Moreno. "How Informational Constraints for Decision-Making on Passing, Dribbling and Shooting Change With the Manipulation of Small-Sided Games Changes in Futsal". Perceptual and Motor Skills 128, n.º 4 (22 de mayo de 2021): 1684–711. http://dx.doi.org/10.1177/00315125211016350.
Texto completoGuedea Delgado, Julio Cesar, Raúl Josué Nájera Longoria, Oscar Núñez Enríquez, Ramón Candía Luján y Gabriel Gastélum Cuadras. "Sistemas tácticos y resultados de competición del Mundial de Fútbol Asociación de Rusia 2018.Tactical systems and matches results from the Football Association Worldcup Rusia 2018." Retos, n.º 36 (6 de junio de 2019): 503–9. http://dx.doi.org/10.47197/retos.v36i36.69296.
Texto completoPraça, Gibson Moreira, Hugo Folgado, André Gustavo Pereira de Andrade y Pablo Juan Greco. "Comportamento tático coletivo em Pequenos Jogos no Futebol: influência de jogadores adicionais". Brazilian Journal of Kinanthropometry and Human Performance 18, n.º 1 (16 de marzo de 2016): 62. http://dx.doi.org/10.5007/1980-0037.2016v18n1p62.
Texto completoMontgomery, Paul G., David B. Pyne y Clare L. Minahan. "The Physical and Physiological Demands of Basketball Training and Competition". International Journal of Sports Physiology and Performance 5, n.º 1 (marzo de 2010): 75–86. http://dx.doi.org/10.1123/ijspp.5.1.75.
Texto completoZhang, Jing, Shifei Shen y Rui Yang. "The impacts of adaptive attacking and defending strategies on mitigation of intentional threats". Kybernetes 39, n.º 5 (15 de junio de 2010): 825–37. http://dx.doi.org/10.1108/03684921011043279.
Texto completoTesis sobre el tema "Defensive game systems"
Guinto, Roi John. "Serious games for improved defense contracting". Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90050.
Texto completoCataloged from PDF version of thesis.
Includes bibliographical references (pages 85-88). Gameography: page 89.
Gaming has been explored as a research technique in complex systems to explore human interactions within technical domains. These so-called "serious games" are designed for purposes outside of pure entertainment and are intended to help researchers engage with qualitative data that focuses on human behavior. This thesis focuses on a research game called ColumBID which was designed for the Production in the Innovation Economy shipbuilding study. This game seeks to understand the negotiation process in defense contracting and is used to facilitate and record the participants' movement through the tradespace. From a game theory perspective, we analyzed the non-Pareto dominant movements through the tradespace and found that humans explore the space by sliding along fronts until they reach an optimal and then jumping to another front to negotiate another optimal point. The players then compare these optimal points to simplify the multi-variable optimization. We found that an 8% contract price improvement in the competitive case compared to the monopolistic case. This thesis recommends that serious research game design focus on questions about the process rather than the endgame optimization.
by Roi John Guinto.
S.M. in Technology and Policy
Christofer, Malmberg y Phan Henrik. "Lindenmayer’s Defense: Generating projectile patterns in a video game environment using L-Systems". Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20003.
Texto completoEldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization". Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.
Texto completoDoctor of Philosophy
Cyber-physical systems (CPSs) have recently been used in many application domains because of their ability to integrate physical elements with a cyber layer allowing for sensing, monitoring, and remote controlling. This pervasive use of CPSs in different applications has brought forward new security challenges and threats. Malicious attacks can now leverage the connectivity of the cyber layer to launch remote attacks and cause damage to the physical components. Taking these threats into consideration, it became imperative to ensure the security of CPSs. Given that many CPSs provide critical services, for instance many critical infrastructure (CI) are CPSs such as smart girds and nuclear reactors; it is then inevitable to ensure that these critical CPSs can maintain proper operation. One key measure of the CPS’s functionality, is resilience which evaluates the ability of a CPS to deliver its designated service under potentially disruptive situations. In general, resilience measures a CPS’s ability to adapt or rapidly recover from disruptive events. Therefore, it is crucial for CPSs to be resilient in face of potential failures. To this end, the central goal of this dissertation is to develop novel analytical frameworks that can evaluate and improve security and resilience of CPSs. In these frameworks, cross-disciplinary tools are used from game theory, contract theory, and optimization to develop robust analytical solutions for security and resilience problems. In particular, these frameworks led to the following key contributions in cyber security: developing an analytical framework to mitigate the effects of GPS spoofing attacks against UAVs, introducing a game-theoretic moving target defense (MTD) framework to improve the cyber security, and securing data privacy in m-health Internet of Things (IoT) networks using a MTD cryptographic framework. In addition, the dissertation led to the following contributions in CI resilience: developing a general framework using Bayesian Networks to evaluate and improve the resilience of CIs against their components failure, introducing a contracttheoretic model to allocate resources to multiple connected CIs under complete and asymmetric information scenarios, providing a proactive plan to improve the resilience of transportation networks against flooding, and, finally, developing an environment-aware framework to deploy UAVs in disaster-areas
Luo, Yi. "DECISION MAKING UNDER UNCERTAINTY IN DYNAMIC MULTI-STAGE ATTACKER-DEFENDER GAMES". Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/204331.
Texto completoCampos, Simone Silva. "O jogo e os jogos: o jogo da leitura, o jogo de xadrez e a sanidade mental em A defesa Lujin, de Vladimir Nabokov". Universidade do Estado do Rio de Janeiro, 2014. http://www.bdtd.uerj.br/tde_busca/arquivo.php?codArquivo=6936.
Texto completoNo romance A defesa Lujin, de Vladimir Nabokov, publicado em russo em 1930, o texto procura levar o leitor a adotar processos mentais similares ao de um jogador de xadrez e de um esquizofrênico, características do personagem-título do romance. Delineiam-se as expectativas e circunstâncias de um ser de papel que se vê jogando um xadrez em que também é peça e traçam-se paralelos com as expectativas e circunstâncias do leitor perante esse texto literário. O prefácio de Nabokov à edição em inglês de 1964 é tomado como indício de um leitor e um autor implícitos que ele procura moldar. Para análise dos elementos textuais e níveis de abstração mental envolvidos, recorre-se à estética da recepção de Wolfgang Iser e a diversas ideias do psiquiatra e etnólogo Gregory Bateson, entre elas o conceito de duplo vínculo, com atenção às distinções entre mapa/território e play/game. Um duplo duplo vínculo é perpetrado na interação leitor-texto: 1) o leitor é convidado a sentir empatia pela situação do personagem Lujin e a considerá-lo lúcido e louco ao mesmo tempo; e 2) o leitor é colocado como uma instância pseudo-transcendental incapaz de comunicação com a instância inferior (Lujin), gerando uma angústia diretamente relacionável ao seu envolvimento com a ficção, replicando de certa forma a loucura de Lujin. A sinestesia do personagem Lujin é identificada como um dos elementos do texto capaz de recriar a experiência de jogar xadrez até para quem não aprecia o jogo. Analisa-se a conexão entre a esquizofrenia ficcional do personagem Lujin e a visão batesoniana do alcoolismo
In Vladimir Nabokovs novel, The Luzhin Defense, published in Russian in 1930, the text beckons the reader on to adopt mental processes similar to a chess players and a schizophrenic persons both traits of the novels title character. This character sees himself both as player and piece of an ongoing game of chess; his expectations and predicaments are traced in parallel to the readers own as he or she navigates the text. Nabokovs preface to the 1964 English edition is taken as an indication that he tries to shape both an implicit reader and an implicit author. In order to analyze the elements of the text and degrees of mental abstraction involved in this, we refer to Wolfgang Isers reader-response theory and also many of psychiatrist and ethnologist Gregory Batesons ideas, such as the double bind, with special regard to map vs. territory and play vs. game distinctions. A double double bind is built within the reader-text interplay as follows: 1) the reader is invited to feel empathy for Luzhins predicament and to regard him at once as sane and insane; and 2) the reader is posited as a pseudo-transcendental instance unable to communicate with his nether instance (Luzhin) in such a way that it brews a feeling of anxiety directly relatable to his or her engagement in the work of fiction, reproducing, in a way, Luzhins madness. Luzhins synesthesia is identified as one of the text elements with the ability to recreate the chess-playing experience even to readers who are not fond of the game. The connection between Luzhins fictional schizophrenia and Batesons views on alcoholism is analyzed
Růžek, Adam. "Využití taktických variant obranných herních systémů florbalových družstev v nejvyšších soutěžích České republiky a Finska". Master's thesis, 2021. http://www.nusl.cz/ntk/nusl-446409.
Texto completoLin, Hua-Chen y 林華振. "Visual Strategy Analysis System for Basketball Game-Recognition of Offense and Defense Pattern". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/78298102674777739093.
Texto completo國立東華大學
資訊工程學系
98
Recently, sport video analysis is a popular topic in the field of computer vision. We analyze the relative 2D locations of players, basketball, and basket to determine offense and defense patterns in a basketball video captured in a fixed view point. The paper can be divided to two parts. The first part is to find the 2D projected locations of players, ball and basket. The second part is to extract features to find out the changes of offense and defense patterns in a basketball game. With the help of the proposed system, audiences can realize the game matching strategy and more deep information that are missing in current basketball game broadcasting.
Mark, Hung Chuang y 莊泓. "The Influences of Cross-Strait Relations on ROC’s Military Capability with Respect to Economic Growth and Defense Budget:The Application of Game Theory and System Dynamics". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/89854795885576228667.
Texto completo國防管理學院
資源管理研究所
95
This study looks at the impact from the Cross-Strait economic relation to ROC's economic growth,and PRC's military threat.It's applied by game theory and system dynamics to evaluate the influences from the defense budget to ROC's military capability,and current situations.Meanwhile ,it provides correlative recommendations. According to the empirical analysis,if the tension of the Cross-Strait relation ceases both side to trade with each other,it will affect us more than the cease of the overseas trade;the cognition of PRC’s threats affects much higher than prior impacts.Besides, PRC’s purpose is to make us”not to fight”and”dare not to fight”,then ultimately causes our surrender without warfares.Due to such situations,we ROC ought not to overly depend upon the Mainland economically,and enforce our psychological reconstruction at the same time.Then we’ll not feel quite helpless to send PRC everything they ask.
Libros sobre el tema "Defensive game systems"
Soltis, Andy. Black to play and win with 1-g6: A complete defensive system. 2a ed. Dallas, Tex: Chess Digest, 1993.
Buscar texto completoJajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. New York, NY: Springer New York, 2013.
Buscar texto completoSuper NES games secrets: For the super nintendo entertainment system. Rocklin, CA: Prima Pub., 1992.
Buscar texto completoArnold, J. Douglas. Awesome Super Nintendo Secrets. Maui, USA: Sandwich Islands Publishing, 1992.
Buscar texto completoSoltis, Andy. Black Defensive System For The Rest Of Your Chess Career. 2a ed. Chess Digest, 1997.
Buscar texto completoDagger, Richard. Playing Fair with Punishment. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199388837.003.0007.
Texto completoJajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup y X. Sean Wang. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.
Buscar texto completoJajodia, Sushil, Anup K. Ghosh y V. S. Subrahmanian. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.
Buscar texto completoCapítulos de libros sobre el tema "Defensive game systems"
Li, Nianyu, Mingyue Zhang, Eunsuk Kang y David Garlan. "Engineering Secure Self-Adaptive Systems with Bayesian Games". En Fundamental Approaches to Software Engineering, 130–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_7.
Texto completoAdnan, Mohd, Toa Yang, Sayekat Kumar Das y Tazeem Ahmad. "Utility of Game Theory in Defensive Wireless Sensor Networks (WSNs)". En Advances in Intelligent Systems and Computing, 895–904. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5113-0_75.
Texto completoPradeep Kumar, K. y B. R. Prasad Babu. "DSMANET: Defensive Strategy of Routing Using Game Theory Approach for Mobile Adhoc Network". En Advances in Intelligent Systems and Computing, 311–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91192-2_31.
Texto completoLevitin, Gregory. "Optimizing Defense Strategies for Complex Multi-State Systems". En Game Theoretic Risk Analysis of Security Threats, 33–64. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-87767-9_3.
Texto completoSun, Xueyan, Xiaowu Liu y Shuwen Zhang. "A Simplified Attack-Defense Game Model for NSSA". En Wireless Algorithms, Systems, and Applications, 820–28. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21837-3_80.
Texto completoRavishankar, Monica, D. Vijay Rao y C. R. S. Kumar. "Game Theory-Based Defense Mechanisms of Cyber Warfare". En Advances in Intelligent Systems and Computing, 149–52. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8569-7_16.
Texto completoKim, Song-Kyoo. "Enhanced Design of Stochastic Defense System with Mixed Game Strategies". En Game Theory for Networking Applications, 107–17. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93058-9_7.
Texto completoKumar, Bhupender y Bubu Bhuyan. "Game Theoretical Defense Mechanism Against Bandwidth Based DDoS Attacks". En Proceedings of the International Conference on Computing and Communication Systems, 601–13. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-33-4084-8_58.
Texto completoSimmons, Chris B., Sajjan G. Shiva, Harkeerat Singh Bedi y Vivek Shandilya. "ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy". En Security and Privacy Protection in Information Processing Systems, 344–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_26.
Texto completoTan, Tse Guan, Yung Nan Yong, Kim On Chin, Jason Teo y Rayner Alfred. "Automated Evaluation for AI Controllers in Tower Defense Game Using Genetic Algorithm". En Soft Computing Applications and Intelligent Systems, 135–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40567-9_12.
Texto completoActas de conferencias sobre el tema "Defensive game systems"
Garcia, Eloy, David W. Casbeer y Meir Pachter. "Escape Regions of the Active Target Defense Differential Game". En ASME 2015 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/dscc2015-9628.
Texto completoHe, Fei, Chiamaka Agwuegbo, Nageswara S. V. Rao y Chris Y. T. Ma. "A Sequential Game of Defense and Attack on an Interdependent System of Systems". En 2018 International Conference on Information Fusion (FUSION). IEEE, 2018. http://dx.doi.org/10.23919/icif.2018.8455314.
Texto completoZhang, Xiaoxiong, Kun Ding, Hui Zhang y Guoquan Jiang. "Incorporating risk preferences into a defense-attack game". En 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2020. http://dx.doi.org/10.1109/smc42975.2020.9282870.
Texto completoPachter, Meir, David W. Casbeer y Eloy Garcia. "Linear Quadratic Formulation of the Target Defense Differential Game". En 2019 International Conference on Unmanned Aircraft Systems (ICUAS). IEEE, 2019. http://dx.doi.org/10.1109/icuas.2019.8797892.
Texto completoGao, Xiang y Yue-Fei Zhu. "DDoS Defense Mechanism Analysis Based on Signaling Game Model". En 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC). IEEE, 2013. http://dx.doi.org/10.1109/ihmsc.2013.105.
Texto completoTurner, James D. y Brian P. Mann. "Sensitivity of Final Field Position to the Punt Initial Conditions in American Football". En ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-60235.
Texto completoCarta, Federica, Diego Ros McDonnell y Pedro Enrique Collado Espejo. "El Castillo de La Atalaya (siglo XVIII), en Cartagena (Región de Murcia, España). Análisis formal y constructivo". En FORTMED2020 - Defensive Architecture of the Mediterranean. Valencia: Universitat Politàcnica de València, 2020. http://dx.doi.org/10.4995/fortmed2020.2020.11366.
Texto completoXiong, Qiang, Wei-jun Zhong y Shu-e. Mei. "A signal game model on security defense of information system". En 2011 IEEE 18th International Conference on Industrial Engineering and Engineering Management. IEEE, 2011. http://dx.doi.org/10.1109/icieem.2011.6035162.
Texto completoLiang, Yu y Donghua Qin. "A Bayesian Game Approach for Security Defense Strategy in WSN". En 2nd International Conference on Computer Application and System Modeling. Paris, France: Atlantis Press, 2012. http://dx.doi.org/10.2991/iccasm.2012.275.
Texto completoStrasser, Benjamin. "What's in a game: game-theoretic analysis for third party planning". En Open Architecture/Open Business Model Net-Centric Systems and Defense Transformation 2021, editado por Raja Suresh. SPIE, 2021. http://dx.doi.org/10.1117/12.2589560.
Texto completoInformes sobre el tema "Defensive game systems"
Letchford, Joshua. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems. Office of Scientific and Technical Information (OSTI), septiembre de 2016. http://dx.doi.org/10.2172/1330190.
Texto completoHoffman, Wyatt. AI and the Future of Cyber Competition. Center for Security and Emerging Technology, enero de 2021. http://dx.doi.org/10.51593/2020ca007.
Texto completo