Results 31 to 40 of about 233,719 (314)

The moduli space of curves is rigid [PDF]

open access: yes, 2008
We prove that the moduli stack of stable curves of genus g with n marked points is rigid, i.e., has no infinitesimal deformations. This confirms the first case of a principle proposed by Kapranov. It can also be viewed as a version of Mostow rigidity for
Hacking, Paul
core   +3 more sources

Birational geometry of cluster algebras [PDF]

open access: yes, 2014
We give a geometric interpretation of cluster varieties in terms of blowups of toric varieties. This enables us to provide, among other results, an elementary geometric proof of the Laurent phenomenon for cluster algebras (of geometric type), extend ...
Gross, Mark, Hacking, Paul, Keel, Sean
core   +1 more source

A genealogy of hacking [PDF]

open access: yes, 2016
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This paper proposes genealogy as a framework for
Bamford J   +54 more
core   +1 more source

Hacking Surveillance Cameras, Tricking AI and Disputing Biases: Artistic Critiques of Machine Vision

open access: yesOpen Library of Humanities, 2023
In the field of AI, troublesome machine behaviour is a recurring problem, and is particularly worrying when the governance of populations is externalised to machines.
Linda Kronman
doaj   +2 more sources

The “Ethics” of Teaching Ethical Hacking [PDF]

open access: yes, 2013
Programs teaching ethical hacking are growing steadily. The argument for teaching ethical hacking focuses on the need to better understand attacks and attackers.
Pike, Ronald E.
core   +1 more source

Towards More Robust Nanobioscience: Launching the NanoBubbles Replication Initiative

open access: yesAngewandte Chemie, EarlyView.
The NanoBubbles Reproducibility Initiative investigates the robustness of highly cited articles in nanobioscience. Here, we document the process of setting up the initiative from corpus creation to publishing results. We also present platforms that we adopted and challenges that we faced.
Maha Said   +2 more
wiley   +2 more sources

Mirror symmetry for log Calabi-Yau surfaces I [PDF]

open access: yes, 2015
We give a canonical synthetic construction of the mirror family to a pair (Y,D) of a smooth projective surface with an anti-canonical cycle of rational curves, as the spectrum of an explicit algebra defined in terms of counts of rational curves on Y ...
Gross, Mark, Hacking, Paul, Keel, Sean
core   +2 more sources

Integrable clusters [PDF]

open access: yes, 2014
The goal of this note is to study quantum clusters in which cluster variables (not coefficients) commute which each other. It turns out that this property is preserved by mutations.
Berenstein, Arkady   +2 more
core   +3 more sources

Ethical Hacking and Hacking Attacks

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT, 2022
In today’s world information is available online to a large number of users who access information many times in a day . Information can be used in both good and bad ways (like destroying or stealing the data of websites or databases without the knowledge of their owner/ hacking someone’s account without their knowledge / Stealing bank account ...
openaire   +2 more sources

Co-design com Prática Sustentável no Ensino de Design de Moda

open access: yesRevista de Ensino em Artes, Moda e Design, 2020
A questão da sustentabilidade é apresentada hoje como um dos principais desafios da sociedade hipermoderna. Designers de moda e educadores têm a oportunidade de adotar um paradigma de design de moda, que se afasta das estruturas clássicas da
Desamparados Pardo Cuenca
doaj   +1 more source

Home - About - Disclaimer - Privacy