نتایج جستجو برای: censorship

تعداد نتایج: 4089  

Journal: :Journal of Information, Law and Technology 2004
Ida Azmi

When Malaysia embarked into its gigantic multimedia super-corridor project in 1995, the equivalent to the US Silicon Valley, one of her promises to her foreign counterparts is that there will be no censorship on the Internet. This assurance was embodied in section 3 (3) of the Communication and Multimedia Act 1998 that states “nothing in this Act shall be construed as permitting the censorship ...

2015
Bridger Hahn Rishab Nithyanand Phillipa Gill Rob Johnson

Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...

Journal: :Physical review letters 1993
Friedman Schleich Witt

All three-manifolds are known to occur as Cauchy surfaces of asymptotically flat vacuum spacetimes and of spacetimes with positive-energy sources. We prove here the conjecture that general relativity does not allow an observer to probe the topology of spacetime: any topological structure collapses too quickly to allow light to traverse it. More precisely, in a globally hyperbolic, asymptoticall...

2015
Jeffrey Knockel Masashi Crete-Nishihata Jason Q. Ng Adam Senft Jedidiah R. Crandall

Social media companies operating in China face a complex array of regulations and are liable for content posted to their platforms. Through reverse engineering we provide a view into how keyword censorship operates on four popular social video platforms in China: YY, 9158, Sina Show, and GuaGua. We also find keyword surveillance capabilities on YY. Our findings show inconsistencies in the imple...

2006
Simon Boag Sydney

One particular area of contention in discussions of Freudian dream theory and its relation to the neuroscientific evidence is the notion of “disguise-censorship” and its relation to dream bizarreness. The discussion to date, however, has neglected the conceptual basis of repression and disguise-censorship, and this paper aims to clarify the role of repression in dreaming and its contribution to...

2017

Roya Ensafi is a Research Assistant Professor in Computer Science and Engineering at the University of Michigan, where her research focuses on computer networking and security. She pioneered the use of side-channels to remotely measure network interference and censorship of Internet traffic. Prior to joining Michigan, she was a postdoc at Princeton University. [email protected] Despite the perva...

1999
G. J. Galloway K. Schleich D. M. Witt E. Woolgar

Motivated by recent interest in black holes whose asymptotic geometry approaches that of anti-de Sitter spacetime, we give a proof of topological censorship applicable to spacetimes with such asymptotic behavior. Employing a useful rephrasing of topological censorship as a property of homotopies of arbitrary loops, we then explore the consequences of topological censorship for horizon topology ...

2015
Cecylia Bocovich John A. Doucette Ian Goldberg

We propose Lavinia, a censorship resistant publishing system that incentivizes document storage through the use of an anonymous, distributed, time-locked payment system. This has the advantage of allowing the publisher to decide whether a document is worth storing, and for how long, instead of relying on public interest or an appointed editorial board. We give a description of related work in c...

2002
Andrei Serjantov

In this paper we propose a new Peer-to-Peer architecture for a censorship resistant system with user, server and active-server document anonymity as well as efficient document retrieval. The retrieval service is layered on top of an existing Peer-to-Peer infrastructure, which should facilitate its implementation. The key idea is to separate the role of document storers from the machines visible...

Journal: :The Electronic Library 2008
David Wilson

Recent developments in entertainment and communications technology have created challenges for those who make classification decisions and who enforce censorship law. High speed private internet access, DVD technology, mobile telephony and advances in video gaming have all created challenges for censorship legislation originally designed to deal with films, videos and paper publications. The la...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید