Filters








85 Hits in 3.8 sec

Eluding carnivores

Emin Gün Sirer, Sharad Goel, Mark Robson, Doǧan Engin
2004 Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC - EW11  
This paper outlines the design of Herbi-voreFS, a scalable and efficient file sharing system that provides strong anonymity.  ...  Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy.  ...  Overall, the HerbivoreFS system provides a strong anonymity for file sharers while scaling up to large networks and running efficiently over existing networks.  ... 
doi:10.1145/1133572.1133611 dblp:conf/sigopsE/SirerGRE04 fatcat:hhnsyvuqabgs5atckud2zo2fym

Postcopulatory sexual selection and the evolution of shape complexity in the carnivoran baculum

Charlotte A. Brassey, Julia Behnsen, James D. Gardiner
2020 Proceedings of the Royal Society of London. Biological Sciences  
Hypotheses for the function of the baculum include aiding in intromission, stimulating females and assisting with prolonged mating.  ...  Our study provides evidence of postcopulatory sexual selection pressures driving three-dimensional shape complexity in the carnivore baculum.  ...  We thank Anna Herdina and two anonymous reviewers for their valuable feedback and role in significantly improving the manuscript.  ... 
doi:10.1098/rspb.2020.1883 pmid:33049172 fatcat:stpg623ijvdyvdadcbsclutdz4

Lethal Control, Tradition, and Politics: Anthropocentric Large Carnivore Management in Western Canada [article]

Victoria M. Lukasik, University Of Calgary, University Of Calgary, Shelley M. Alexander
2018
However, managers discussed their lack of involvement in land-use decisions, particularly with regard to oil and gas leases in Alberta.  ...  Interviews were semi-structured, covering a broad range of topics related to carnivore management. Transcribed interviews were coded in NVivo to identify trends and themes in carnivore management.  ...  Acknowledgements First, to my research participants, thank you for taking the time to speak with me, and for sharing your experiences, opinions, and perspectives.  ... 
doi:10.11575/prism/31908 fatcat:leirhw23xnfixdknb3vrp75b5u

Hacktivism: Securing the national infrastructure

Mark Milone
2003 Knowledge, Technology and Policy  
These are telltale habits or tendencies that can be compared with other, less anonymous posts.  ...  Carnivore (DCS1000).  ... 
doi:10.1007/s12130-003-1017-5 fatcat:4t234dvggfehbnvpb6ou5px3xy

An Intelligence Dictionary Offering "Success Before Work," Review, Intelligence and Information Policy for National Security

Gary T. Marx
2018 Secrecy and Society  
DRY CLEANING Any technique used to elude surveillance.  ...  Terms reflecting popular culture terms such as "do not file, files", "terminate with extreme prejudice, "wet" or "black bag jobs" are not included, although other popular terms are such as back channel  ...  The book is a valuable research tool in the endless quest for knowledge regarding how we can best be protected both by, and from, those with power.  ... 
doi:10.31979/2377-6188.2018.010212 fatcat:xluepjsfxzaenofg2l76tyvvnq

Introduction

Sascha Engel, Jordan Laney, Anthony Szczurek, Christian Matheis
2015 Spectra  
Are the interfaces of peers networking with peers all of the same kind? By whom and to what end is 'the hacker' represented?  ...  In her article We are all anonymous: beyond hacktivist stereotypes, Emma Stamm analyses the twofaced reality of hacktivism. Who is hacking the peer2peer networks' interfaces?  ...  DeHart had been involved with Anonymous at a young age and ran a computer server using Tor through which he had unwittingly received a file that contained "information that demonstrated malfeasance and  ... 
doi:10.21061/spectra.v4i2.254 fatcat:yir5bmus7rcabkozlqmqfz42oy

Criminal Law in Cyberspace

Neal Kumar Katyal
2001 Social Science Research Network  
The infamous ILoveYou bug shared elements of both viruses and worms.  ...  Although these are four separate types of activity, each shares the common nucleus of unauthorized access combined with distribution of the information to others. B.  ... 
doi:10.2139/ssrn.249030 fatcat:q5ieh6h7z5blvhfkuop2ytnjee

Teamwork in Animals, Robots, and Humans [chapter]

Carl Anderson, Nigel R. Franks
2003 Advances in the Study of Behavior  
Acknowledgments We thank Tucker Balch, Peter Godwin, Stephen Harris, Peter Neumann, Scott Powell, Matt Quinn, Tim Roper, Peter Saul, Peter Slater, and an anonymous referee for their help and suggestions  ...  Carnivores C O R R E C T E D P R O O F groups.  ...  Hexmoor and Beavers (2001) also claim that, ''agents with nontrivial ability and objectives who are not aware of other agents sharing their objectives cannot partner [for teamwork].''  ... 
doi:10.1016/s0065-3454(03)33001-3 fatcat:2sy57gqmu5cwjkcx4midgzclea

Internet Casinos: A Sure Bet for Money Laundering

Jon Mills
2001 Journal of Financial Crime  
There should be a strong commitment to sharing information and to facilitating extradition in order to make the most effective use of the limited resources available for such operations.  ...  Without a connection to a particular nation with a strong commitment to defeating money laundering schemes, the transaction may be beyond the reach of prosecutors.  ... 
doi:10.1108/eb026001 fatcat:7av4cvfzzjfvhjh47widw2dv4i

"Mr. Kayerts. He is Dead": Literary Realism and Conrad's "Outpost of Progress"

Jim Holstun
2018 ELH: English literary history  
or the reactionary Muslim world (The Rushdie File, ed.  ...  their share of the power'" (N, 365).  ... 
doi:10.1353/elh.2018.0007 fatcat:7npdu7pltnh3fc73u6skckezjq

The New Visibility of Slaughter in Popular Gastronomy [article]

Jovian Lang Parry, University Of Canterbury
2011
through the slaughter, butchery, and consumption of nonhuman bodies, is held to be an integral component in the performance of gender, as well as a means of reconnecting, via a kind of secular epiphany, with  ...  This thesis interrogates the myths, assumptions and ideologies underlying this so-called New Carnivore movement, through critical analysis of a range of popular gastronomic texts.  ...  Somehow they've managed to reconcile what eludes most of us eaters here in North America: the marrying of virtue with pleasure.  ... 
doi:10.26021/4892 fatcat:ted7yqxuvnfrldnnqya56daxh4

Bureaucratic Agencies [chapter]

Scott Furlong
2007 Encyclopedia of Public Administration and Public Policy, Second Edition (Print Version)  
Within all representations of bureaucracy linger traces of the unmanageable, a fugitive presence that eludes classification, regulation, and narratives of control.  ...  Within all representations of bureaucracy linger traces of the unmanageable, an Indigenous fugitive presence that eludes classification, regulation, and narratives of control.  ...  Alternative alliances have emerged, which further elude state power by decolonizing institutional knowledge 11 : Anonymous-affiliated group Operation Thunderbird helped the Save Wįyąbi Project develop  ... 
doi:10.1201/noe1420052756.ch44 fatcat:765yo3h3hve2nfpqztbn3wjflu

Surveillance, Fighting Crime And Violence (Iriss Deliverable 1.1)

David Wright, Johann Cas, Ivan Szekely, Beatrix Vissy, Michael Friedewald, Kerstin Goos, William Webster, Gemma Galdon Clavell, Rowena Rodrigues, Reinhard Kreissl, Clive Norris, Marija Krlic (+10 others)
2012 Zenodo  
A recorded fingerprint is linked to written information about an individual kept in police files and if a print, sharing a significant number of defined features with recorded prints, is found on a crime  ...  ., comparing data from crime scenes with information stored in police data files) is easy. 6.  ...  Spain, the ECtHR said that the presumption of innocence requires that "the members of the court should not start with the preconceived idea that the accused has  ... 
doi:10.5281/zenodo.1184324 fatcat:vxti37nlxbbejg6mjbk72ruh3e

Number 2 Secrecy and Authoritarianism Article 12

Gary Marx, Jan Goldman, Susan Reviewed, Gary Marx
2018 unpublished
DRY CLEANING Any technique used to elude surveillance.  ...  Terms reflecting popular culture terms such as "do not file, files", "terminate with extreme prejudice, "wet" or "black bag jobs" are not included, although other popular terms are such as back channel  ...  The book is a valuable research tool in the endless quest for knowledge regarding how we can best be protected both by, and from, those with power.  ... 
fatcat:ou4mnstz2ncvtordbqze3vn3gi

Human-Leopard Conflict and Coexistence in Northern Kenya [article]

Alan Ching, Joyce Choi, Robert Hart, Laura McNeil, Anna Urso, University, My, Neil Carter
2021
We assist with this mission by analyzing ecological and sociological data related to human-leopard conflict collected by SDZWA.  ...  This is certainly true in Laikipia County, where private and community conservancies are being used as strategies for integrating the livelihood needs of pastoralists with leopard conservation goals.  ...  This table was joined with the conflict location data to form a consolidated CSV file that could be used for analyses in R.  ... 
doi:10.7302/977 fatcat:j4ofxuzs4vgrjk3q6ki6pcwaem
« Previous Showing results 1 — 15 out of 85 results