Results 31 to 40 of about 233,719 (314)
The moduli space of curves is rigid [PDF]
We prove that the moduli stack of stable curves of genus g with n marked points is rigid, i.e., has no infinitesimal deformations. This confirms the first case of a principle proposed by Kapranov. It can also be viewed as a version of Mostow rigidity for
Hacking, Paul
core +3 more sources
Birational geometry of cluster algebras [PDF]
We give a geometric interpretation of cluster varieties in terms of blowups of toric varieties. This enables us to provide, among other results, an elementary geometric proof of the Laurent phenomenon for cluster algebras (of geometric type), extend ...
Gross, Mark, Hacking, Paul, Keel, Sean
core +1 more source
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This paper proposes genealogy as a framework for
Bamford J +54 more
core +1 more source
Hacking Surveillance Cameras, Tricking AI and Disputing Biases: Artistic Critiques of Machine Vision
In the field of AI, troublesome machine behaviour is a recurring problem, and is particularly worrying when the governance of populations is externalised to machines.
Linda Kronman
doaj +2 more sources
The “Ethics” of Teaching Ethical Hacking [PDF]
Programs teaching ethical hacking are growing steadily. The argument for teaching ethical hacking focuses on the need to better understand attacks and attackers.
Pike, Ronald E.
core +1 more source
Towards More Robust Nanobioscience: Launching the NanoBubbles Replication Initiative
The NanoBubbles Reproducibility Initiative investigates the robustness of highly cited articles in nanobioscience. Here, we document the process of setting up the initiative from corpus creation to publishing results. We also present platforms that we adopted and challenges that we faced.
Maha Said +2 more
wiley +2 more sources
Mirror symmetry for log Calabi-Yau surfaces I [PDF]
We give a canonical synthetic construction of the mirror family to a pair (Y,D) of a smooth projective surface with an anti-canonical cycle of rational curves, as the spectrum of an explicit algebra defined in terms of counts of rational curves on Y ...
Gross, Mark, Hacking, Paul, Keel, Sean
core +2 more sources
The goal of this note is to study quantum clusters in which cluster variables (not coefficients) commute which each other. It turns out that this property is preserved by mutations.
Berenstein, Arkady +2 more
core +3 more sources
Ethical Hacking and Hacking Attacks
In today’s world information is available online to a large number of users who access information many times in a day . Information can be used in both good and bad ways (like destroying or stealing the data of websites or databases without the knowledge of their owner/ hacking someone’s account without their knowledge / Stealing bank account ...
openaire +2 more sources
Co-design com Prática Sustentável no Ensino de Design de Moda
A questão da sustentabilidade é apresentada hoje como um dos principais desafios da sociedade hipermoderna. Designers de moda e educadores têm a oportunidade de adotar um paradigma de design de moda, que se afasta das estruturas clássicas da
Desamparados Pardo Cuenca
doaj +1 more source

