Breaking Up: An Essay on Secession

1994 ◽  
Vol 24 (3) ◽  
pp. 357-371 ◽  
Author(s):  
David Gauthier

Current discussion of the normative issues surrounding secession is both helped and hindered by the existence of but one philosophic treatment of these issues sufficiently systematic and comprehensive to qualify as a theory of secession - Allen Buchanan’s. He provides the unique focal point, and so simplifies the task of those who seek to begin from the present state of the art. But in providing the unique focal point, Buchanan complicates the task of those who view, or think they view, secession rather differently than he does. He defends ’a moral right to secede’ but a very qualified right, focusing on state-perpetrated injustice, the preservation of group culture and, in extreme cases, the literal survival of group members (152-3). And Buchanan further insists that where preservation of group culture is at stake, ’Neither the state nor any third party has a valid claim to the seceding territory’ -or such a claim is waived so that ’secession in order to preserve a culture is permissible if both parties consent to it’- a condition that he thinks may come to apply to the situation of Quebec.

Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5165
Author(s):  
Chen Dong ◽  
Yi Xu ◽  
Ximeng Liu ◽  
Fan Zhang ◽  
Guorong He ◽  
...  

Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality, leakage of information, even a denial of services (DoS), and so on. In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. Starting from the introduction of HT structures, the recent researches in the academic community about HTs is compiled and comprehensive classification of HTs is proposed. The state-of-the-art HT protection techniques with their advantages and disadvantages are further analyzed. Finally, the development trends in hardware security are highlighted.


Author(s):  
Fuqi Cai ◽  
Changjing Wang ◽  
Qing Huang ◽  
Zhengkang Zuo ◽  
Yunyan Liao

Third-party libraries always evolve and produce multiple versions. Lucene, for example, released ten new versions (from version 7.7.0 to 8.4.0) in 2019. These versions confuse the existing code search methods to retrieve the source code that is not compatible with local programming language. To solve this issue, we propose DCSE, a deep code search model based on evolving information (i.e. evolved code tokens and evolution description). DCSE first deeply excavates evolved code tokens and evolution description in the code evolution process; then it takes evolved code tokens and evolution description as one feature of source code and code description, respectively. With such fuller representation, DCSE embeds source code and its code description into a high-dimensional shared vector space, and makes the cosine distance of their vectors closer. For the ever-evolving third-party libraries like Lucene, the experimental results show that DCSE could retrieve the source code that is compatible with local programming language, it outperforms the state-of-the-art methods (e.g. CODEnn) by 56.9–60.9[Formula: see text] in RFVersion. For the rarely-evolving third-party libraries, DCSE outperforms the state-of-the-art methods (e.g. CODEnn) by 4–11[Formula: see text] in Precision.


2008 ◽  
Vol 42 (1) ◽  
pp. 44-51 ◽  
Author(s):  
J. W. Nicholson ◽  
A. J. Healey

AUVs have proved their usefulness in recent years and continue to do so. This paper is a review of the current state of the art of AUVs. Present AUV capabilities are reviewed through a discussion of feasible present-day AUV missions. The state of key AUV design features and sensor technologies is also addressed, identifying those areas most critical to continued future progress in AUV development.


2021 ◽  
Vol 4 (2) ◽  
pp. 1
Author(s):  
Maria João Mimoso ◽  
Joana Lourenço Pinto

Arbitration as a way of resolving disputes between companies is essentially linked to the advantages of arbitration, especially with the speed and neutrality of arbitration, as well as the confidentiality, the possibility of choosing arbitrators with precise technical knowledge in the area of litigation, among others. The parties choose arbitration as a means of resolving disputes, relating to interests of an equity nature, bearing in mind that for some legislators the emphasis is on the availability of rights, arising from the contractual relationship that unites them. The payment of costs is a sine qua non condition for the constitution of the arbitral tribunal. The parties must proceed with the payment of taxes and fees, respectively to the arbitration center they have chosen and the arbitrators they have chosen. Considering that the economic situation of the companies may fluctuate, either during the execution of the main contract, or when the dispute arises, the constitution of the arbitral tribunal and during the procedural iter, the possibility of financing the arbitration was outlined. Third-Party Funding is a figure that involves a third-party, unrelated to the litigation, who will defray the expenses due by one of the parties to the arbitration. It will have as a counterpart the participation in the eventual financial result achieved through the success of the arbitration. As a methodology, in addition to analyzing the state of the art, we will indicate real cases and the reasons for the growth of this instrument, without forgetting the ethical issues involved.


Author(s):  
Alexandre de Oliveira Chaves

Com base em informações diretas (geologia) e indiretas (geofísica-aeromagnetometria) atualizadas e disponíveis, sete enxamesde diques máficos de composição basáltica reveladores de importantes processos geológicos vem sendo progressivamente melhorcaracterizados superficial e subsuperficialmente em Minas Gerais em vários aspectos como disposição espaço-temporal, petrografia,geoquímica, crono-estratigrafia e ambiência geotectônica. O presente estado do conhecimento sobre os mesmos aponta que um únicoenxame tem sua gênese vinculada a regime compressional durante a Orogênese Transamazônica. Os outros seis enxames estãorelacionados a regimes extensionais, sendo muitos deles relacionados à formação de importantes bacias sedimentares guardadas em Minas Gerais, enquanto outros se constituem marcadores da separação América do Sul-África durante a fragmentação do Supercontinente Gondwana no Mesozóico.Palavras-chave: enxames de diques máficos, Minas Gerais. ABSTRACTMAFIC DYKE SWARMS OF MINAS GERAIS - THE STATE OF THE ART. Based on updated and available direct (geology) and indirect(aeromagnetometry) information, seven mafic dyke swarms of basaltic composition have been progressively better characterized atsurface and subsurface in Minas Gerais State. The present state of knowledge points that a single swarm has genesis linked tocompressional setting during Transamazonian Orogeny. All other six swarms are related to crustal extensional settings, many of which arerelated to the formation of important sedimentary basins stored in Minas Gerais and other ones as markers of separation between SouthAmerica and Africa during the Gondwana Supercontinent fragmentation.Keywords: mafic dyke swarms, Minas Gerais.


Author(s):  
T. A. Welton

Various authors have emphasized the spatial information resident in an electron micrograph taken with adequately coherent radiation. In view of the completion of at least one such instrument, this opportunity is taken to summarize the state of the art of processing such micrographs. We use the usual symbols for the aberration coefficients, and supplement these with £ and 6 for the transverse coherence length and the fractional energy spread respectively. He also assume a weak, biologically interesting sample, with principal interest lying in the molecular skeleton remaining after obvious hydrogen loss and other radiation damage has occurred.


Author(s):  
Carl E. Henderson

Over the past few years it has become apparent in our multi-user facility that the computer system and software supplied in 1985 with our CAMECA CAMEBAX-MICRO electron microprobe analyzer has the greatest potential for improvement and updating of any component of the instrument. While the standard CAMECA software running on a DEC PDP-11/23+ computer under the RSX-11M operating system can perform almost any task required of the instrument, the commands are not always intuitive and can be difficult to remember for the casual user (of which our laboratory has many). Given the widespread and growing use of other microcomputers (such as PC’s and Macintoshes) by users of the microprobe, the PDP has become the “oddball” and has also fallen behind the state-of-the-art in terms of processing speed and disk storage capabilities. Upgrade paths within products available from DEC are considered to be too expensive for the benefits received. After using a Macintosh for other tasks in the laboratory, such as instrument use and billing records, word processing, and graphics display, its unique and “friendly” user interface suggested an easier-to-use system for computer control of the electron microprobe automation. Specifically a Macintosh IIx was chosen for its capacity for third-party add-on cards used in instrument control.


2003 ◽  
Vol 48 (6) ◽  
pp. 826-829 ◽  
Author(s):  
Eric Amsel
Keyword(s):  

1968 ◽  
Vol 13 (9) ◽  
pp. 479-480
Author(s):  
LEWIS PETRINOVICH
Keyword(s):  

1984 ◽  
Vol 29 (5) ◽  
pp. 426-428
Author(s):  
Anthony R. D'Augelli

Sign in / Sign up

Export Citation Format

Share Document