Semantic Scholar uses AI to extract papers important to this topic.
One of the foremost Marxist critics of his generation forcefully argues against Marx's irrelevancy In this combative… Expand An overview of the hurricane hazard model, terrain model, wind pressure, and windborne debris models used in the HAZUS-MH… Expand Abstract Current software tools for visualization of spatio-temporal data, on the one hand, utilize the opportunities provided by… Expand As the value of data on computing systems increases and operating systems become more secure, physical attacks on computing… Expand Downside risk measures in portfolio analysis purport to be a major improvement over traditional portfolio theory. This article… Expand The Digital Millennium Copyright Act of 1998 ("DMCA") prohibits the circumvention of technological protection measures used by… Expand It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques… Expand The classic guide to network securityi¾now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet… Expand Future parallel computers must efficiently execute not only hand-coded applications but also programs written in high-level… Expand I Pr inces have always sought out soothsayers of one kind or another for the purpose of learning what the future holds. These… Expand