Clone Wars

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Clone Wars

Code clones, the result of the ”copy&paste” programming technique, have negative impact on software quality and on the efficiency of the software maintenance process. Although copying may be the fastest way of creating a new feature, after a while it is really hard to detect and maintain the multiple instances of the same code snippets. Based on static source code analysis, clone detectors try ...

متن کامل

Intercepting Tokens: The Empire Strikes Back in the Clone Wars

We discuss interception attacks on cryptographic protocols which rely on trustworthy hardware like one-time memory tokens (Goldwasser et al., Crypto 2008). In such attacks the adversary can mount man-in-the-middle attacks and access, or even substitute, transmitted tokens. We show that many of the existing token-based protocols are vulnerable against this kind of attack, which typically lies ou...

متن کامل

Clone wars: the evolution of therapeutic resistance in cancer

Cancer chemotherapy kills some tumour cells, leaving behind resistant clones with less competition for space and resources. These clones, groups of cells that share common ancestry, proliferate without restriction causing disease relapse. Tumours contain a host of cancer clones that are genetically and epigenetically different from one another [1]. These clones follow a Darwinian process of som...

متن کامل

Quantum physics. In clone wars, quantum computers need not apply.

R. Nagel, University of Chicago; June B. Nasrallah, Cornell University; William D. Nix, Stanford University. Helen R. A. Quinn, Stanford Linear Accelerator Center; Michael Rosbash, HHMI and Brandeis University; A. Catharine Ross, Pennsylvania State University; Linda J. Saif, Ohio State University, Wooster; Paul L. Schechter, MIT; William H. Schlesinger, Duke University; Robert J. Silbey, MIT; B...

متن کامل

How to Make ASLR Win the Clone Wars: Runtime Re-Randomization

Existing techniques for memory randomization such as the widely explored Address Space Layout Randomization (ASLR) perform a single, per-process randomization that is applied before or at the process’ load-time. The efficacy of such upfront randomizations crucially relies on the assumption that an attacker has only one chance to guess the randomized address, and that this attack succeeds only w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Neurosurgery

سال: 2005

ISSN: 0148-396X,1524-4040

DOI: 10.1093/neurosurgery/57.1.n7