Scientists leaked H-bomb secrets, says US
نویسندگان
چکیده
منابع مشابه
US agency says Zika virus causes microcephaly.
Zika virus is the cause of a surge in birth defects across Latin America and the Caribbean, the US Centers for Disease Control (CDC) announced on 13 April, linking Zika infection during pregnancy not only to microcephaly but also to congenital blindness, stillbirth, and other fetal abnormalities. The announcement was timed to coincide with the online publication in the New England Journal of Me...
متن کاملUS nurse says she will fight Ebola quarantine.
The US nurse who cared for patients with Ebola virus disease in west Africa and is now being held in quarantine in her home in Maine said on 29 October that she would challenge her detention in court. The nurse, Kaci Hickox, was held in an isolation tent for three days outside a New Jersey hospital over the weekend after she returned from Sierra Leone. The 33 year old nurse was found to have a ...
متن کاملMarkets for leaked information
Markets for leaked information* We study markets for sensitive personal information. An agent wants to communicate with another party but any revealed information can be intercepted and sold to a third party whose reaction harms the agent. The market for information induces an adverse sorting effect, allocating the information to those types of third parties who harm the agent most. In equilibr...
متن کاملANGELIC Secrets: Bridging from Factors to Facts in US Trade Secrets
The ANGELIC (ADF for kNowledGe Encapsulation of Legal Information from Cases) project provided a methodology for implementing a system to predict the outcome of legal cases based on a theory of the relevant domain constructed from precedent cases and other sources. The method has been evaluated in several domains, including US Trade Secrets Law. Previous systems in this domain were based on fac...
متن کاملWhat Information Is Leaked under Concurrent Composition?
A long series of works have established far reaching impossibility results for concurrently secure computation. On the other hand, some positive results have also been obtained according to various weaker notions of security (such as by using a super-polynomial time simulator). This suggest that somehow, “not all is lost in the concurrent setting.” In this work, we ask what and exactly how much...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 1979
ISSN: 0028-0836,1476-4687
DOI: 10.1038/281246a0