Meta‐Virtuality: Strategies of Disembeddedness in Virtual Interiorities
ABSTRACT To reclaim their seat in the rapidly growing market of virtual space, designers of the built environment can benefit from reevaluating theories that see the virtual as a mere extension/reflection of the physical. By claiming ontological autonomy from external worlds, the virtual is liberated from the hegemonic control of the physical.
Vahid Vahdat
wiley +1 more source
On the Substitution of Identicals in Counterfactual Reasoning [PDF]
It is widely held that counterfactuals, unlike attitude ascriptions, preserve the referential transparency of their constituents, i.e., that counterfactuals validate the substitution of identicals when their constituents do.
Alonso‐Ovalle Luis +11 more
core +1 more source
Predicates and proper names have been traditionally treated under different semantic categories. Proper names are considered as singular noncomplex terms whereas predicates are taken as general ones.
Alfonso García Suárez
doaj +1 more source
Radiometric Constraints on the Timing, Tempo, and Effects of Large Igneous Province Emplacement
Exploring the links between Large Igneous Provinces and dramatic environmental impact
An emerging consensus suggests that Large Igneous Provinces (LIPs) and Silicic LIPs (SLIPs) are a significant driver of dramatic global environmental and biological changes, including mass extinctions.
Jennifer Kasbohm +2 more
wiley +1 more source
DNNobfus: a study on obfuscation-based edge-side model protection framework
The proliferation of artificial intelligence models has rendered them vulnerable to a myriad of security threats. The extensive integration of deep learning models into edge devices has introduced novel security challenges. Given the analogous structural
SONG Feiyang +6 more
doaj +3 more sources
A Program Logic for Verifying Secure Routing Protocols [PDF]
The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done to understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such as Secure BGP (S-BGP).
Chen, Chen +5 more
core +5 more sources
Opaque predicates, veiled sets and their logic
Latex2e, no ...
Krause, Decio, French, Steven
openaire +2 more sources
CodeTrolley: Hardware-Assisted Control Flow Obfuscation [PDF]
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables.
Boskov, Novak +2 more
core +1 more source
A Comparative Study of Coq and HOL [PDF]
This paper illustrates the differences between the style of theory mechanisation of Coq and of HOL. This comparative study is based on the mechanisation of fragments of the theory of computation in these systems.
A. Church, C. Paulin-Mohring
core +3 more sources
ABSTRACT Public organisations often experience a discrepancy between improvements in technical efficiency and stakeholders' perceptions of integrity and performance. This study analyses the mechanisms that may underlie this efficiency–perception discrepancy in Spanish Defence Delegations during 2020–2023.
José Solana‐Ibáñez +1 more
wiley +1 more source

