Filters








176 Hits in 6.5 sec

Adversarial Fence Patrolling: Non-Uniform Policies for Asymmetric Environments

Yaniv Oshrat, Noa Agmon, Sarit Kraus
2020 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
We present a patrol strategy with a non-uniform policy along different points of the fence, based on the location and other properties of the point.  ...  In this work we examine the Fence Patrol problem, in which the robots must travel back and forth along an open polyline and the adversary is aware of the robots' patrol strategy.  ...  Advantage of the Non-Uniform P Policy: Theoretical Study As shown in Fig. 4 , the non-uniform P policy yields better results (i.e. higher Minppd) than the uniform p policy for all track configurations  ... 
doi:10.1609/aaai.v34i06.6606 fatcat:e4padpegrjeyhordxe462o3qsu

Multi-Robot Adversarial Patrolling: Facing a Full-Knowledge Opponent [article]

Noa Agmon, Gal A. Kaminka, Sarit Kraus
2014 pre-print
and in different environment models - either patrol around a perimeter (closed polygon) or an open fence (open polyline).  ...  Therefore this paper presents a non-deterministic patrol framework for the robots.  ...  We thank the anonymous reviewers for constructive comments and helpful suggestions, and as always, thanks to K. Ushi.  ... 
doi:10.1613/jair.3365 arXiv:1401.3903v1 fatcat:sa6a2lmhwzajvpnneem3hbggym

TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s [article]

Muhammed Kawser Ahmed, Sujan Kumar Saha, Christophe Bobda
2022 arXiv   pre-print
The experiment results show that TrustToken can provide a secure, low-cost, and trusted solution for non-trusted SoC IPs.  ...  TrustToken only allows trusted communication between the non-trusted third-party IP and the rest of the SoC world by providing essential security features, i.e., secure, isolated execution, and trusted  ...  We used an asymmetric cryptographic solution that can generate identification tokens in runtime conditions without using any non-volatile memory or any secure boot system.  ... 
arXiv:2209.12987v1 fatcat:r5aajchyvzbypictxdqdfkwkju

Facilitated news as controlled information flows: The origins, rationale and dilemmas of 'embedded' journalism

Paul G Buchanan
2011 Pacific Journalism Review – Te Koakoa  
For the post-Vietnam US military, independent news coverage was problematic because it often contradicts the official war narrative and, if left unhindered, undermines public support for the war effort  ...  Since public support is crucial for success in a foreign war, particularly during lengthy engagements, independent news coverage is seen as a threat to the unity of the home front and therefore a threat  ...  To that can be added the return of independent journalists (again, mostly non-US citizens) to difficult-to-control battle spaces such as in Afghanistan, which unlike Iraq cannot be easily ring-fenced or  ... 
doi:10.24135/pjr.v17i1.374 fatcat:wxwb4qjqmrhcbdd5sjgd3jp65u

A Survey on Spectrum Management for Unmanned Aerial Vehicles (UAVs)

Mohammed A. Jasim, Hazim Shakhatreh, Nazli Siasi, Ahmad Sawalmeh, Adel Aldalbahi, Ala Al-Fuqaha
2021 IEEE Access  
In addition, network monitoring, patrolling, and enforcement schemes are identified.  ...  Motivated by this observation, this article presents a comprehensive survey on spectrum management for UAV operations.  ...  use of a uniform circular array seems a suitable approach for UAV, as opposed to uniform or rectangular arrays that suffer from enlarged sidelobes.  ... 
doi:10.1109/access.2021.3138048 fatcat:2h5ls7ywo5g3bbz454gqatvkw4

Liquid neutrality [chapter]

Matti Roitto, Antero Holmila
2021 The Nordic Economic, Social and Political Model  
rapid deployment in crisis and conflict management against lower-tier and asymmetrical adversaries and in counter-terrorism operations.  ...  Russia had for a long time been seen as a potential adversary.  ... 
doi:10.4324/9780429026690-5 fatcat:qojwueoup5azvlbejkthoecvs4

Parameters – Full Issue – Winter 2015

USAWC Parameters
2015 Parameters  
It has sought to foster a peaceful international environment in which democracy can flourish.  ...  As will be shown, calls for dramatic retrenchment and "offshore balancing" rest on weak historical foundations.  ...  How many days a week do you fence to go out and see for yourself, to go on a patrol, to meet with Iraqi leaders in their areas, to meet with our leaders all the way down to the company and platoon level  ... 
doi:10.55540/0031-1723.2650 fatcat:3sinhptxufg57fhht4dfea3qaa

Parameters Summer 2022

USAWC Press
2022 Parameters  
Western support has allowed them to compensate for their deficiencies in armaments and munitions.  ...  This commentary also shows military and policy leaders how the political context continues to impose limitations on the Ukrainians.  ...  Using the Market Model to Deter Faits Accomplis States wishing to maintain the status quo must shape the environment for themselves and their adversaries by attempting to increase the value of the territory  ... 
doi:10.55540/0031-1723.3147 fatcat:qbyam2jbwjbe7lwo2eteqmwwqy

Protecting Crowded Places from Terrorism: An Analysis of the Current Considerations and Barriers Inhibiting the Adoption of Counterterrorism Protective Security Measures

David McIlhatton, James Berry, David Chapman, Pernille H. Christensen, John Cuddihy, Rachel Monaghan, Dan Range
2018 Studies in Conflict and Terrorism  
Asymmetric tactics routinely employed by terrorist adversaries include: Denial and Deception -Dispersion and hiding in complex terrain and urban environments degrade situational awareness and complicate  ...  Terrorist Use of Asymmetrical Tactics Terrorists prefer to attack their adversaries asymmetrically by circumventing an opponent's strength and exploiting his weaknesses.  ...  A threat analysis will review the factors of a terrorist group's existence, capability, intentions, history, and targeting, as well as the security environment within which friendly forces operate.  ... 
doi:10.1080/1057610x.2018.1507311 fatcat:nenlnah5qjchdb2dm6ug7h3v7q

Same Water, Difference Dreams: Salient Lessons of the Sino-Japanese War for Future Naval Warfare

Andrew Rhodes
2020 MCU Journal  
The Sino-Japanese War of 1894–95 remains a cautionary tale full of salient lessons for future conflict.  ...  Carriers are useful for patrolling the sea lanes or even power projection in the absence of antiaccess measures.  ...  In today's security environment, that access is increasingly contested by state and non-state actors that can hold even our most advanced forces and weapon systems at risk with their own sophisticated  ... 
doi:10.21140/mcuj.20201102002 fatcat:i75a5j73pbd4vax543d74t2i6a

Applying AI on the Battlefield: The Ethical Debates [chapter]

Gregory M. Reichberg, Henrik Syse
2021 Robotics, AI, and Humanity  
The chapter concludes with a reflection on the moral challenges posed by human-AI teaming in battlefield settings, and how virtue ethics provides a valuable framework for addressing these challenges.  ...  Acknowledgements The authors thank Joe Reeder and Sigurd Hovd for valuable comments to earlier drafts of the article.  ...  This would be an AI-based extension of the electric fence.  ... 
doi:10.1007/978-3-030-54173-6_12 fatcat:4yw4frwy5fhb5cvv3yu2uslhtm

The President and Immigration Law

Adam B. Cox, Cristina Rodriguez
2009 Social Science Research Network  
Whether Congress intended for the President to have such freedom is less important than understanding that the Executive's power is asymmetric.  ...  The plenary power doctrine sharply limits the judiciary's power to police immigration regulation-a fact that has preoccupied immigration law scholars for decades.  ...  Nationals of Guatemala, El Salvador, the former Soviet Union and its successor republics, and most Eastern European nations were given the right to apply for cancellation of removal under pre-1996 standards  ... 
doi:10.2139/ssrn.1356963 fatcat:zw7fanz4nbde5hvphxo2jgg724

What Should This Fight Be Called?

Arie W. Kruglanski, Martha Crenshaw, Jerrold M. Post, Jeff Victoroff
2007 Psychological Science in the Public Interest  
It has insinuated itself into the public discourse about counterterrorism, and it has guided policy, but it has also met challenges because of lack of fit and the availability of counteranalogies with  ...  The conflict is zero-sum-the outcome will be victory for one side or the other-and there is no compromise. The war metaphor is totalistic and extreme.  ...  opportunities for optimal contact between members of the Muslim and non-Muslim communities.  ... 
doi:10.1111/j.1539-6053.2008.00035.x pmid:26161891 fatcat:nxdpxi52avelzcjihalmkhvw74

Bodies as evidence: security, knowledge, and power

Emily C. Kaufman
2020 Social & Cultural Geography  
Environment and Planning D 26(1): 7 -28. Cornelius, Wayne A. 2001. "Death at the Border: Efficacy and Unintended Consequences of U.S. Immigration Control Policy."  ...  "We are not Border Patrol. Since he's on this side of the fence, wherever it is, we had been told to treat that patient," one fire captain explained.  ...  On the one hand, calls for evidence-based policies and practices seem to be heard everywhere; on the other hand, previously taken-for-granted evidential relations are being tested and teased apart.  ... 
doi:10.1080/14649365.2020.1732523 fatcat:fnk2lbajzrd3plk4cg4ufixpbu

Parameters – Full Issue

USAWC Parameters
2014 Parameters  
Ross Harrison describes three prerequisites for a broader, integrative strategy in "Towards a Regional Strategy Contra ISIS."  ...  Sorenson's "Priming Strategic Communications: Countering the Appeal of ISIS" suggests critical points for an effective strategic communications campaign.  ...  Use of Asymmetric Means The fourth novel element in Crimea is another old Soviet concept in new skins: asymmetrical warfare (now rephrased by many academics as non-linear war). 22 This concept consists  ... 
doi:10.55540/0031-1723.2647 fatcat:bbtwkamt7nbs3iimvokhutadoi
« Previous Showing results 1 — 15 out of 176 results