Retroactive Prophets

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Net prophets

Statements that " we have come to do biology in a new way " or " there is a new paradigm in biological research " are now commonplace. Nobody seems to be satisfied by a single good experiment that gives a precise answer to a well formulated question, which was the old way we did biology. On the contrary there is now a belief that a mass attack on parallel fronts can provide a database of all th...

متن کامل

Schedulers are no Prophets

Several formalisms for concurrent computation have been proposed in recent years that incorporate means to express stochastic continuous-time dynamics and non-determinism. In this setting, some obscure phenomena are known to exist, related to the fact that schedulers may yield too pessimistic verification results, since current nondeterminism can surprisingly be resolved based on prophesying th...

متن کامل

The 12 prophets dataset

The "Ajeijadinho 3D" project is an initiative supported by the University of São Paulo (Museum of Science and Dean of Culture and Extension), which involves the 3D digitization of art works of Brazilian sculptor Antonio Francisco Lisboa, better known as Aleijadinho. The project made use of advanced acquisition and processing of 3D meshes for preservation and dissemination of the cultural herita...

متن کامل

Retroactive Motors

ing is managed? Intracellular Transport in Neurons The Logic of Intracellular Transport It is well known that axons are long and lack the machinThe basic principles are clear and simple (Figure 1). ery for protein synthesis. Therefore, we are taught that Most long-range transport isdirected by themicrotubule there is axonal transport of proteins synthesized in the cytoskeleton. Microtubules hav...

متن کامل

Retroactive auditing Citation

Retroactive auditing is a new approach for detecting past intrusions and vulnerability exploits based on security patches. It works by spawning two copies of the code that was patched, one with and one without the patch, and running both of them on the same inputs observed during the system’s original execution. If the resulting outputs differ, an alarm is raised, since the input may have trigg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science

سال: 1987

ISSN: 0036-8075,1095-9203

DOI: 10.1126/science.238.4828.727