Smashing the racket

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Protection Racket

In recent years, it has been encouraging to watch the developmental non-governmental organizations (NGOs) become more sophisticated in their thinking on the benefits of trade liberalization. NGOs such as Public Citizen that are against all forms of liberalization are now rare. Most NGOs including, for example, Oxfam, Christian Aid and Action Aid today agree that poor countries would benefit fro...

متن کامل

The Racket Manifesto

The creation of a programming language calls for guiding principles that point the developers to goals. This article spells out the three basic principles behind the 20-year development of Racket. First, programming is about stating and solving problems, and this activity normally takes place in a context with its own language of discourse; good programmers ought to formulate this language as a...

متن کامل

Smashing Subcategories and the Telescope

We give a new characterization of smashing subcategories in a compactly generated triangulated category and prove a modiied version of Ravenel's telescope conjecture in this setting. Our results apply in particular to the stable homotopy category. Our approach, however, is purely algebraic; it is based on an analysis of pure injective objects in a compactly generated triangulated category.

متن کامل

Data Smashing

Investigation of the underlying physics or biology from empirical data requires a quantifiable notion of similarity when do two observed data sets indicate nearly identical generating processes, and when they do not. The discriminating characteristics to look for in data is often determined by heuristics designed by experts, e:g:, distinct shapes of “folded” lightcurves may be used as “features...

متن کامل

Smashing the stack - A 25 year retrospective

Buffer overflows still remain a problem for software today. Even with address space randomization and non-executable stacks software remains vulnerable to clever exploits. In this paper we introduce the buffer overflow through a pratical example and take a retrospective look on the past 25 years of the arms race on buffer overflow exploits and protections.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Significance

سال: 2016

ISSN: 1740-9705

DOI: 10.1111/j.1740-9713.2016.00914.x