Downloading Evil

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

See no evil, hear no evil, speak no evil.

INTRODUCTION “[D]eath is different.” When used to punish, death taps society’s most primal urges. It is meant to be a deterrent for potential offenders, triggering in them the innate reflex for self-preservation. For society, it is meant to feed the primal desire for retribution. For these very reasons, it is often claimed that death is only reserved for the worst of the worst. However, in tryi...

متن کامل

See no evil, hear no evil….

A 32-year-old woman presented with right-sided visual loss, hearing loss and diffuse headache. Examination confirmed CN-II, V1/2, and VIII neuropathies. MRI showed an infiltrative skull-base process involving the pachymeninges. Serology and histopathology confirmed idiopathic hypertrophic pachymeningitis.

متن کامل

Downloading Hidden Web Content

An ever-increasing amount of information on the Web today is available only through search interfaces: the users have to type in a set of keywords in a search form in order to access the pages from certain Web sites. These pages are often referred to as the Hidden Web or the Deep Web. Since there are no static links to the Hidden Web pages, search engines cannot discover and index such pages an...

متن کامل

Understanding Widget Downloading Preferences

This paper explains the results of a user study on 131 participants in Finland. The study measured how feedback information influences customers’ decision making, and what impact individual feedback elements have. The study was conducted using a research prototype that simulates a real world widget sharing website. Our results indicate that customer reviews are the most important feedback eleme...

متن کامل

See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing

Additive Manufacturing is an increasingly integral part of industrial manufacturing. Safety-critical products, such as medical prostheses and parts for aerospace and automotive industries are being printed by additive manufacturing methods with no standard means of verification. In this paper, we develop a scheme of verification and intrusion detection that is independent of the printer firmwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Index on Censorship

سال: 2007

ISSN: 0306-4220,1746-6067

DOI: 10.1080/03064220701738610