Taming Cyberspace

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Legal Cyberspace

Abstract: The paper introduces 'Legal Cyberspace' which can be regarded as a tool for exploring other legal worlds. In practical terms legal cyberspace is a computer-generated interactive graphics environment, i.e. a system of databases and knowledge-base applications rather than a specific application. Developed from difficulties gaining access to foreign legal material for a research project ...

متن کامل

Hacking Cyberspace

Knowledge about cyberspace is shaped and delimited by the questions we ask and the kinds of inquiries we pursue. Questioning, of course, is never objective or neutral. As Martin Heidegger demonstrates, a question, no matter how carefully articulated, necessarily harbors preconceptions and pre-understandings that direct and regulate inquiry (24). When we ask, for example, whether cyberspace port...

متن کامل

Taming Entanglement

Using a spontaneous parametric-downconversion source of photon pairs, we are working towards the creation of arbitrary 2-qubit quantum states with high fidelity. Currently, all physically allowable combinations of polarization entanglement and mixture can be produced, including maximally-entangled mixed states. The states are experimentally measured and refined via computer-automated quantum-st...

متن کامل

Taming Reflection

Static program analyses and transformations for Java face many problems when analyzing programs that use reflection or custom class loaders: How can a static analysis know which reflective calls the program will execute? How can it get hold of classes that the program loads from remote locations or even generates on the fly? And if the analysis transforms classes, how can these classes be re-in...

متن کامل

Taming Linux

This paper describes the overall design, partial implementation and brief performance evaluation of a system in which Linux and its applications run besides real-time applications. The separation of the real-time and time-sharing subsystems is not restricted to the use of the CPU but enforced as well for other resources, namely main memory and caches. This paper details the changes needed for t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Index on Censorship

سال: 2011

ISSN: 0306-4220,1746-6067

DOI: 10.1177/0306422011399696