When to Censor?

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Censor Detection

Our goal is to empirically discover how censors react to the introduction of new proxy servers that can be used to circumvent their information controls. We examine a specific case, that of obfuscated Tor bridges, and conduct experiments designed to discover how long it takes censors to block them (if they do block at all). Through a year’s worth of active measurements from China, Iran, Kazakhs...

متن کامل

Supersymmetry as a cosmic censor.

In supersymmetric theories the mass of any state is bounded below by the values of some of its charges. The corresponding bounds in the case of Schwarzschild (M & 0 ) and Reissner-Nordstrom (M & ~q~) black holes are known to coincide with the requirement that naked singularities be absent. Here we investigate [U(1)j charged dilaton black holes in this context. The extreme solutions are shown to...

متن کامل

A Technique to Censor Biological Echoes in Radar Reflectivity Data

Existing techniques of quality control of radar reflectivity data rely on local texture and vertical profiles to discriminate between precipitating echoes and non-precipitating echoes. Non-precipitating echoes may be due to artifacts such as anamalous propagation, ground clutter, electronic interference, sun strobe, and biological contaminants (i.e., birds, bats and insects). The local texture ...

متن کامل

The Cosmic Censor Forbids Naked Topology

For any asymptotically at spacetime with a suitable causal structure obeying (a weak form of) Penrose's cosmic censorship conjecture and satisfying conditions guaranteeing focusing of complete null geodesics, we prove that active topological censorship holds. We do not assume global hyperbolicity, and therefore make no use of Cauchy surfaces and their topology. Instead, we replace this with two...

متن کامل

Active Protocols for Agile, Censor-Resistant Networks

In this paper we argue that content distribution in the face of censorship is a compelling and feasible application of active networking. In the face of a determined and powerful adversary, every fixed protocol can become known and subsequently monitored, blocked, or its member nodes identified and attacked. Frequent and diverse protocol change is key to allowing information to continue to flow...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: American Journal of Epidemiology

سال: 2017

ISSN: 0002-9262,1476-6256

DOI: 10.1093/aje/kwx281