Meta‐Virtuality: Strategies of Disembeddedness in Virtual Interiorities
ABSTRACT To reclaim their seat in the rapidly growing market of virtual space, designers of the built environment can benefit from reevaluating theories that see the virtual as a mere extension/reflection of the physical. By claiming ontological autonomy from external worlds, the virtual is liberated from the hegemonic control of the physical.
Vahid Vahdat
wiley +1 more source
Code trolley: hardware-assisted control flow obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core +2 more sources
Description of the approach to development of the obfuscating compiler
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev +2 more
doaj +1 more source
Radiometric Constraints on the Timing, Tempo, and Effects of Large Igneous Province Emplacement
Exploring the links between Large Igneous Provinces and dramatic environmental impact
An emerging consensus suggests that Large Igneous Provinces (LIPs) and Silicic LIPs (SLIPs) are a significant driver of dramatic global environmental and biological changes, including mass extinctions.
Jennifer Kasbohm +2 more
wiley +1 more source
Predicates and proper names have been traditionally treated under different semantic categories. Proper names are considered as singular noncomplex terms whereas predicates are taken as general ones.
Alfonso García Suárez
doaj +1 more source
DNNobfus: a study on obfuscation-based edge-side model protection framework
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang +6 more
doaj +3 more sources
A Program Logic for Verifying Secure Routing Protocols [PDF]
The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done to understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such as Secure BGP (S-BGP).
Chen, Chen +5 more
core +4 more sources
A Comparative Study of Coq and HOL [PDF]
This paper illustrates the differences between the style of theory mechanisation of Coq and of HOL. This comparative study is based on the mechanisation of fragments of the theory of computation in these systems.
A. Church, C. Paulin-Mohring
core +3 more sources
Is the Quality of Numerical Subroutine Code Improving? [PDF]
We begin by using a software metric tool to generate a number of software complexity measures and we investigate how these values may be used to determine subroutines which are likely to be of substandard quality.
Hopkins, Tim
core +4 more sources
xx xx. ABSTRACT Osseointegration of orthopedic and dental implants is influenced by local and systemic factors, including their physicochemical surface properties and the patient's overall health status. Titanium and its alloys have been a longstanding standard for bone implants due to their innate biocompatibility and mechanical properties.
Dainelys Guadarrama Bello +2 more
wiley +1 more source

