Censor

Results: 230



#Item
21

Chilling Effects: NSA Surveillance Drives U.S. Writers to Self-Censor Chilling

Add to Reading List

Source URL: pen.org

- Date: 2016-07-01 23:06:00
    22

    Explain how FreeNet enables individuals to publish anonymous web pages that are extremely difficult to censor. Does this mean that the battle against state censorship in oppressive regimes has been won? Abstract Anonymit

    Add to Reading List

    Source URL: info.cs.st-andrews.ac.uk

    - Date: 2016-08-23 05:35:53
      23

      NIHIL OBSTAT: P. Cornelius Bučmys, O.F.M., I.C.D., Censor deputatus P. Benedictus Bagdonas, O.F.M., Censor deputatus

      Add to Reading List

      Source URL: www.prodeoetpatria.lt

      - Date: 2014-02-22 14:56:26
        24

        Noname manuscript No. (will be inserted by the editor) Algebraic Methods in the Congested Clique Keren Censor-Hillel · Petteri Kaski · Janne H. Korhonen · Christoph Lenzen · Ami Paz · Jukka Suomela

        Add to Reading List

        Source URL: people.mpi-inf.mpg.de

        - Date: 2016-02-29 06:37:01
          25Network theory / NP-complete problems / Edsger W. Dijkstra / Graph coloring / Spanning tree / Matching / Shortest path problem / Logical matrix / Treewidth / Matrix / Minimum spanning tree / Clique

          Algebraic Methods in the Congested Clique∗ † Keren Censor-Hillel Technion

          Add to Reading List

          Source URL: people.mpi-inf.mpg.de

          Language: English - Date: 2015-05-29 10:12:11
          26

          julietartmagazine.com http://julietartmagazine.com/it/simone-forti-censor-performance/ Simone Forti. Censor Performance 2 maggio

          Add to Reading List

          Source URL: www.galleriaastuni.net

          Language: Italian
            27

            Keren Censor-Hillel Personal Department of Computer Science Technion HaifaIsrael

            Add to Reading List

            Source URL: www.cs.technion.ac.il

            Language: English - Date: 2016-01-18 03:17:37
              28

              Distributed Connectivity Decomposition Keren Censor-Hillel Technion ⇤

              Add to Reading List

              Source URL: ac.informatik.uni-freiburg.de

              Language: English - Date: 2014-08-26 17:26:50
                29Internet privacy / Content-control software / Internet security / Internet censorship / Computer network security / Telex / Censorship / Tor / Steganography / Roman censor / Deep packet inspection / Flash proxy

                Censorship Arms Race: Research vs. Practice Sadia Afroz1 , David Fifield1 , Michael C. Tschantz2 , Vern Paxson1,2 , J. D. Tygar1 1 2

                Add to Reading List

                Source URL: www.icir.org

                Language: English - Date: 2015-07-07 21:36:37
                30Internet search engines / Web search engine / Search engine / Personalized search / Search engine technology / Google Search

                james grimmelmann Don’t Censor Search When search engines lead thousands of searchers to anonymous online harassment, it may seem only natural to look for legal ways to make the harassment disappear from search result

                Add to Reading List

                Source URL: james.grimmelmann.net

                Language: English - Date: 2014-12-30 02:27:42
                UPDATE