Results 11 to 20 of about 10,066 (160)

Meta‐Virtuality: Strategies of Disembeddedness in Virtual Interiorities

open access: yesJournal of Interior Design, EarlyView., 2022
ABSTRACT To reclaim their seat in the rapidly growing market of virtual space, designers of the built environment can benefit from reevaluating theories that see the virtual as a mere extension/reflection of the physical. By claiming ontological autonomy from external worlds, the virtual is liberated from the hegemonic control of the physical.
Vahid Vahdat
wiley   +1 more source

On the Substitution of Identicals in Counterfactual Reasoning [PDF]

open access: yes, 2020
It is widely held that counterfactuals, unlike attitude ascriptions, preserve the referential transparency of their constituents, i.e., that counterfactuals validate the substitution of identicals when their constituents do.
Alonso‐Ovalle Luis   +11 more
core   +1 more source

Nombres y predicados

open access: yesCrítica, 2018
Predicates and proper names have been traditionally treated under different semantic categories. Proper names are considered as singular noncomplex terms whereas predicates are taken as general ones.
Alfonso García Suárez
doaj   +1 more source

Radiometric Constraints on the Timing, Tempo, and Effects of Large Igneous Province Emplacement

open access: yesGeophysical Monograph Series, Page 27-82., 2021

Exploring the links between Large Igneous Provinces and dramatic environmental impact

An emerging consensus suggests that Large Igneous Provinces (LIPs) and Silicic LIPs (SLIPs) are a significant driver of dramatic global environmental and biological changes, including mass extinctions.
Jennifer Kasbohm   +2 more
wiley  

+1 more source

DNNobfus: a study on obfuscation-based edge-side model protection framework

open access: yes网络与信息安全学报
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang   +6 more
doaj   +3 more sources

A Program Logic for Verifying Secure Routing Protocols [PDF]

open access: yes, 2014
The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done to understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such as Secure BGP (S-BGP).
Chen, Chen   +5 more
core   +5 more sources

Opaque predicates, veiled sets and their logic

open access: yes, 1998
Latex2e, no ...
Krause, Decio, French, Steven
openaire   +2 more sources

CodeTrolley: Hardware-Assisted Control Flow Obfuscation [PDF]

open access: yes, 2019
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak   +2 more
core   +1 more source

A Comparative Study of Coq and HOL [PDF]

open access: yes, 1997
This paper illustrates the differences between the style of theory mechanisation of Coq and of HOL. This comparative study is based on the mechanisation of fragments of the theory of computation in these systems.
A. Church, C. Paulin-Mohring
core   +3 more sources

Efficiency and Perceptions in Public CSR: An Integrated Efficiency–Perception Analysis of Spanish Defence Delegations

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT Public organisations often experience a discrepancy between improvements in technical efficiency and stakeholders' perceptions of integrity and performance. This study analyses the mechanisms that may underlie this efficiency–perception discrepancy in Spanish Defence Delegations during 2020–2023.
José Solana‐Ibáñez   +1 more
wiley   +1 more source

Home - About - Disclaimer - Privacy