122,799 Hits in 1.9 sec

Default-all is dangerous! [article]

Wolfgang Gatterbauer, Alexandra Meliou, Dan Suciu
2011 arXiv   pre-print
We show that the default-all propagation scheme for database annotations is dangerous.  ...  This is the result of considering all relationally equivalent queries and returning the union of their where-provenance in an attempt to define a propagation scheme that is insensitive to query rewriting  ...  Non-dangerous QRI where-provenance Why is default-all propagation dangerous? The reason is a mismatch in the semantics.  ... 
arXiv:1105.4395v1 fatcat:e6qwrslt2ngazg66sjehktnivi

Dangerous doctors

1970 BMJ (Clinical Research Edition)  
The view that sterilization is illegal when performed merely for contraceptive reasons has now gone in default.  ...  In Herbert's series 47 out of the 88 patients treated conservatively all rapidly recovered. Laparotomy was performed on 41.  ... 
doi:10.1136/bmj.1.5698.705-a fatcat:6kurcuea2bb6pluomrpkxnq5ky

Stranger danger

Nick Nikiforakis, Federico Maggi, Gianluca Stringhini, M. Zubair Rafique, Wouter Joosen, Christopher Kruegel, Frank Piessens, Giovanni Vigna, Stefano Zanero
2014 Proceedings of the 23rd international conference on World wide web - WWW '14  
The danger posed by sequential short URLs is the fact that they can be discovered by others, without being explicitly handed a link.  ...  While this "write-access" of the parent window's location property is the current default behavior of browsers, the iframe markup of HTML5 supports certain security-enhancing attributes which allow the  ... 
doi:10.1145/2566486.2567983 dblp:conf/www/NikiforakisMSRJKPVZ14 fatcat:jsddcpthtjgwrcs5zmpwohbqyu

Danger Invariants [chapter]

Cristina David, Pascal Kesseli, Daniel Kroening, Matt Lewis
2016 Lecture Notes in Computer Science  
We propose a way of expressing danger proofs that is independent of the depth of bugs.  ...  Our conjecture is that such danger proofs will enable the design of bug finding analyses for which the computational effort is independent of the depth of bugs, and thus find deep bugs more efficiently  ...  Example 2 With Def. 3, a possible danger invariant for the example in Fig. 2b is D(x) = x<10. As the guard of the loop holds for all the D-states, this is a recurrence set.  ... 
doi:10.1007/978-3-319-48989-6_12 fatcat:a3bpsbqsabdr3ntaymcooc3xfa


John Barton, S.Wesley Wilson
1902 The Lancet  
A DANGEROUS PRINCIPLE. To the Editors of THE LANCET.  ...  It is much to be regretted that the Liverpool laboratories, from which such excellent work emanates, should be associated with this society, but Liverpool is not the only defaulter in this respect.  ... 
doi:10.1016/s0140-6736(00)65501-0 fatcat:t4i366fkubd3vi3gucy6qbvmcy

Danger is my middle name

Lucky Onwuzurike, Emiliano De Cristofaro
2015 Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks - WiSec '15  
Our experiments show that, although prior work has drawn a lot of attention to SSL implementations on mobile platforms, several popular apps (32/100) accept all certificates and all hostnames, and four  ...  TrustManager manages the certificates of all Certificate Authorities (CA) used in assessing the certificate's validity. Only root CAs trusted by Android are contained in the default TrustManager.  ...  If one forgets to change the keystore used to initialize the TrustManager, the SSL pinning validation logic will act as a fail-safe default, leading to the failure of all secure connections, thus pointing  ... 
doi:10.1145/2766498.2766522 dblp:conf/wisec/OnwuzurikeC15 fatcat:qcdwsm3bczf37mmmyaos3lac7y

Independent Contractor. Dangerous Premises

1898 The Virginia Law Register  
the nature of the INDEPENDENT CONTRACTOR-DANGEROUS PREMISES.  ...  The subject is discussed in 3 Va. Law Reg. 540. INDEPENDENT CONTRACTOR-DANGEROUS PREMISES.-The recent Virginia case of Richmond etc. R. Co. v. Moore, 3 Va. Law Reg. 572 (27 S.  ... 
doi:10.2307/1097970 fatcat:zcqh2hmpwvcphfztq7wvpjmkbe

Drawing Attention to the Dangerous [chapter]

Stathis Kasderidis, John G., Nicolas Tsapatsoulis, Dario Malchiodi
2003 Lecture Notes in Computer Science  
Simulation results based on a simple scenario show that Attention is an appropriate mechanism for implementing context switch detector systems.  ...  The agent is responsible for monitoring adaptively the user in order to detect context switches in his state. Assuming a successful detection appropriate action will be taken.  ...  For simplicity we assume that all the available information is the Heart Rate signal (instead of the ECG).  ... 
doi:10.1007/3-540-44989-2_108 fatcat:4l5jswst5beedmfplt2vph3aze

Dangerous drugs act, 1920

1922 Public Health  
milk supply have provedsatisfactory, and that in such cases prosecutions should be instituted only where a series of tests have shown repeated default.  ...  clear recognition of the necessity for making the teaching of hygiene in its widest sense the basis of all nurses' training.  ... 
doi:10.1016/s0033-3506(22)80076-7 fatcat:mlnd4nwbwjgchoizzklo6ozwna

The Emperor's Dangerous Clothes

Laurence J Kotlikoff
2008 The Economists' Voice  
This is sophistry and a sorry commentary on our profession. Moreover, it is incredibly dangerous at a time when the true deficit, the growth in the fiscal gap, is monumental.  ...  If we want the deficit to be $1.6 trillion this year rather than $160 billion, all we need do is use the right set of labels.  ... 
doi:10.2202/1553-3832.1323 fatcat:itqoro2curh7dfn36ljo6vovqy

The Dangerous Trades Committee

1898 BMJ (Clinical Research Edition)  
Since the formation of the water company in 1846, no outbreak of disease bas occurred which could be attributed to default on the part of the company, and the water is so carefully guarded that the health  ...  not only would glass polishing cease to be a dangerous trade, but it would be exempted from certain Governmental restrictions, which after all cannot but to some extent hamper the industry. i its cutlery  ... 
doi:10.1136/bmj.2.1974.1350 fatcat:azhcxauqs5aonppz67qzhfwd5m

The Dangerous Trades Committee

1898 The BMJ (British Medical Journal) (Print)  
Since the formation of the water company in 1846, no outbreak of disease bas occurred which could be attributed to default on the part of the company, and the water is so carefully guarded that the health  ...  not only would glass polishing cease to be a dangerous trade, but it would be exempted from certain Governmental restrictions, which after all cannot but to some extent hamper the industry. i its cutlery  ... 
pmid:20758121 pmcid:PMC2434515 fatcat:kzcijykinzd5nogpl54qlz3ujq

Uncertain Dangers in Unlawful Detainers

Roger Bernhardt
2006 Social Science Research Network  
effectively prohibits all forms of self-help eviction against defaulting tenants.  ...  ., equal to rental value-it could go a long way toward mitigating the financial dangers of losing. 81 CA 283, 285, 253 P 944.  ... 
doi:10.2139/ssrn.1789269 fatcat:w35n7hbfu5db3cts4fbeezlzwe

The most dangerous code in the world

Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, Vitaly Shmatikov
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
Vulnerable software includes Amazon's EC2 Java library and all cloud clients based on it; Amazon's and PayPal's merchant SDKs responsible for transmitting payment details from e-commerce sites to payment  ...  used by mobile websites; Chase mobile banking and several other Android apps and libraries; Java Web-services middleware-including Apache Axis, Axis 2, Codehaus XFire, and Pusher library for Android-and all  ...  This functionality is controlled by parameters CURLOPT_SSL_VERIFYPEER (default value: true) and CURLOPT_SSL_VERIFYHOST (default value: 2). This interface is almost perversely bad.  ... 
doi:10.1145/2382196.2382204 dblp:conf/ccs/GeorgievIJABS12 fatcat:44o5kvfoevbknawzddsvfrxlyq

The Dangers of Uncalibrated Activated Sludge Simulation Packages

Marie A. Sedran, Anna S. Mehrotra, Albert B. Pincince
2006 Proceedings of the Water Environment Federation  
Activated sludge simulation packages are useful tools, but it can be dangerous to rely on them if they are used incorrectly. How dangerous?  ...  This paper is not written to show which selection is correct, but shows the potential dangers using these models and steps to mitigate these dangers.  ...  Default Evaluate differences predicted in process sizing using all defaults, using the BOD influent model. 2 Set values Default Isolate the relative importance of values for kinetic and stoichiometric  ... 
doi:10.2175/193864706783751546 fatcat:rkrpgi6mrndclcqyez2tzrbsbq
« Previous Showing results 1 — 15 out of 122,799 results