Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,925,640 papers from all fields of science
Search
Sign In
Create Free Account
Shatter attack
Known as:
Shatter
, Shatter attacks
In computing, a shatter attack is a programming technique employed by crackers on Microsoft Windows operating systems to bypass security restrictions…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Backward compatibility
Capability-based security
Code injection
Internet Explorer 7
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Lifted Symmetry Detection and Breaking for MAP Inference
T. Kopp
,
Parag Singla
,
Henry A. Kautz
Neural Information Processing Systems
2015
Corpus ID: 7686466
Symmetry breaking is a technique for speeding up propositional satisfiability testing by adding constraints to the theory that…
Expand
2008
2008
Combinatorial probability and the tightness of generalization bounds
Konstantin Vorontsov
Pattern Recognition and Image Analysis
2008
Corpus ID: 10021758
Accurate prediction of the generalization ability of a learning algorithm is an important problem in computational learning…
Expand
2008
2008
Comparison of stereo displaying techniques in POV-Ray 3D generated scenes
Skala Tibor
,
Todorovac Mirsad
2008
Corpus ID: 195700692
Scientific visualization often requires display and perception of depth and 3D in various applications. A CGI application has…
Expand
2006
2006
New observations on shatter cones in the Vredefort impact structure, South Africa, and evaluation of current hypotheses for shatter cone formation
F. Wieland
,
W. Reimold
,
R. Gibson
2006
Corpus ID: 56368617
Abstract— Shatter cones have been described from many meteorite impact structures and are widely regarded as a diagnostic…
Expand
2004
2004
Discovery of the largest impact crater field on Earth in the Gilf Kebir region, Egypt
P. Paillou
,
A. Barkooky
,
+4 authors
E. Heggy
2004
Corpus ID: 53518698
Review
2000
Review
2000
Gender and leadership styles : A review of the past decade
M. Engen
,
T. Willemsen
2000
Corpus ID: 16275220
Research on sex differences in leadership styles over the past decade (1987-1999) is reviewed and compared with the results of a…
Expand
1988
1988
Shatter cone/bedding interrelationship in the Vredefort Structure: evidence for meteorite impact?
H. Albat
1988
Corpus ID: 133385776
Highly Cited
1977
Highly Cited
1977
Shatter cones formed in large-scale experimental explosion craters
D. Roddy
,
L. K. Davis
1977
Corpus ID: 129258663
In 1968, a series of 0.5-ton and 100-ton TNT explosion experiments were conducted in granitic rock near Cedar City, Utah, as part…
Expand
1975
1975
Shatter cones from Haughton Dome, Devon Island, Canada
P. Robertson
,
G. Mason
Nature
1975
Corpus ID: 4213516
SHATTER cones, products of shock metamorphism, have been discovered at Haughton Dome and indicate a meteorite impact origin for…
Expand
1964
1964
Shatter-cone Orientation at Sudbury, Canada
R. Dietz
,
L. W. Butler
Nature
1964
Corpus ID: 28382605
SHATTER-CONING, a unique type of conical fracturing, appears to be a criterion for shock-induced over-pressures in rock. As such…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE