{"component": "definition", "props": {"groups": [{"size": 3, "snippet_links": [], "samples": [{"hash": "kM6aWM707bE", "uri": "https://docs.legis.wisconsin.gov/code/register/2016/728B/insert/atcp81", "label": "docs.legis.wisconsin.gov", "score": 10.1704312115, "published": false}, {"hash": "fbnnuJ2O8dt", "uri": "https://docs.legis.wisconsin.gov/code/register/2015/714B/insert/atcp81", "label": "docs.legis.wisconsin.gov", "score": 10.1704312115, "published": false}, {"hash": "5BMoaXsaNIt", "uri": "http://docs.legis.wisconsin.gov/code/admin_code/atcp/055/81.pdf", "label": "docs.legis.wisconsin.gov", "score": 10.1704312115, "published": false}], "snippet": "means a cheese requires little pressure to crush and is soft but not necessarily sticky like a pasty cheese.", "hash": "0ebd3f82ddc0963784306defe640f5be", "id": 1}, {"size": 3, "snippet_links": [], "samples": [{"hash": "jLqvgfTwcZa", "uri": "https://www.hort.purdue.edu/prod_quality/quality/grptable.pdf", "label": "www.hort.purdue.edu", "score": 8.1704312115, "published": false}, {"hash": "3YiXr6DODs0", "uri": "https://pdf.usaid.gov/pdf_docs/pnadz538.pdf", "label": "pdf.usaid.gov", "score": 6.1279945243, "published": false}, {"hash": "6MdOhX0Fket", "uri": "https://pdf.usaid.gov/pdf_docs/PA00KN2Q.pdf", "label": "pdf.usaid.gov", "score": 5.4503764545, "published": false}], "snippet": "means that individual berries are somewhat translucent, watery and soft, may have relatively low sugar content, inferior flavor, or are of poor keeping quality.", "hash": "fed5133e93104185bb7a76322ae18f62", "id": 2}, {"size": 2, "snippet_links": [], "samples": [{"hash": "4pYVD6OnECz", "uri": "https://escholarship.org/content/qt1pf307sp/qt1pf307sp.pdf?t=snx1n0", "label": "escholarship.org", "score": 19.8119781576, "published": false}, {"hash": "8hZwiFHgWb", "uri": "https://escholarship.org/content/qt1pf307sp/qt1pf307sp_noSplash_e9f05dc879260e656cf978f91e2fe13e.pdf?t=snx1n0", "label": "escholarship.org", "score": 18.7290089548, "published": false}], "snippet": "means that there are only 1 or 2 well-designed U.S. studies or only studies from elsewhere and/or inconsistent results.", "hash": "938bf790a63038c4cd1cf67a8503d965", "id": 3}, {"size": 1, "snippet_links": [], "samples": [{"hash": "c9SB3sVG6mE", "uri": "https://www.repository.cam.ac.uk/bitstream/handle/1810/342860/Ram-Prasad_PhD_thesis.pdf?sequence=3", "label": "www.repository.cam.ac.uk", "score": 9.4613278576, "published": false}], "snippet": "in this context means simply \u2018non-specific\u2019, such that weak_\u2203x = \u201cthere exists some x\u201d (as opposed to a specific", "hash": "f38a9afedcc0d562aadcb4af9a97f95c", "id": 4}, {"size": 1, "snippet_links": [{"key": "vacant-building", "type": "definition", "offset": [8, 23]}, {"key": "relationship-between-the", "type": "clause", "offset": [122, 146]}, {"key": "the-building", "type": "definition", "offset": [176, 188]}], "samples": [{"hash": "jZX9Ni08ogU", "uri": "https://www.icc.govt.nz/wp-content/uploads/2014/10/Invercargill-Action-Plan-2011.pdf", "label": "www.icc.govt.nz", "score": 6.9204720799, "published": false}], "snippet": "means a vacant building or a building with few windows on eye level facing the footpath, resulting in little or no visual relationship between the footpath and the interior of the building.", "hash": "efbe78b85fa20df7ebc6834d6cefcc93", "id": 5}, {"size": 1, "snippet_links": [], "samples": [{"hash": "e2egA7cdAfR", "uri": "https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=a22485a96a5bdd9855d5da3f260219bade22c06f", "label": "citeseerx.ist.psu.edu", "score": 1.0, "published": false}], "snippet": "here means tested against functions in (Lp", "hash": "3311737b5f5bd0851822caa68440cca0", "id": 6}, {"size": 1, "snippet_links": [{"key": "definition-3", "type": "clause", "offset": [30, 42]}, {"key": "is-not-required-to", "type": "clause", "offset": [43, 61]}, {"key": "resulting-from-the", "type": "clause", "offset": [126, 144]}], "samples": [{"hash": "dcD4ayS8KYf", "uri": "http://www.ii.uib.no/publikasjoner/texrap/pdf/2007-361.pdf", "label": "www.ii.uib.no", "score": 3.0, "published": false}], "snippet": "means that the equivalence in Definition 3 is not required to hold for all pushout-pullback half cube, but only for those one resulting from the Grothendieck construction (see the discussion of \u201cmodularity\u201d in the concluding section).", "hash": "5e6d167f118f05f4d5dee4fa1f8a3e28", "id": 7}, {"size": 1, "snippet_links": [{"key": "our-services", "type": "definition", "offset": [79, 91]}, {"key": "best-practice", "type": "definition", "offset": [117, 130]}, {"key": "email-addresses", "type": "clause", "offset": [273, 288]}, {"key": "create-user-accounts", "type": "clause", "offset": [297, 317]}, {"key": "web-browser", "type": "definition", "offset": [435, 446]}, {"key": "network-data", "type": "definition", "offset": [614, 626]}, {"key": "publicly-available", "type": "clause", "offset": [686, 704]}, {"key": "reports-of", "type": "clause", "offset": [733, 743]}, {"key": "investigation-and-reporting", "type": "clause", "offset": [820, 847]}, {"key": "not-limited", "type": "clause", "offset": [865, 876]}, {"key": "other-users", "type": "definition", "offset": [933, 944]}, {"key": "good-faith-effort", "type": "definition", "offset": [1060, 1077]}, {"key": "physical-security-measures", "type": "clause", "offset": [1139, 1165]}, {"key": "social-engineering", "type": "definition", "offset": [1185, 1203]}, {"key": "distributed-denial-of-service", "type": "definition", "offset": [1213, 1242]}, {"key": "in-general", "type": "clause", "offset": [1319, 1329]}, {"key": "your-actions", "type": "clause", "offset": [1480, 1492]}], "samples": [{"hash": "kKbCiRcwsix", "uri": "/contracts/kKbCiRcwsix#weak", "label": "Bug Bounty Program Agreement", "score": 32.1049349579, "published": true}], "snippet": "cipher suite support, TLS1.0 support, sweet32 etc.); \u2022 Reports indicating that our services do not fully align with \"best practice\" (e.g. missing security headers or suboptimal email-related configurations such as SPF, DMARC etc.); \u2022 Issues surrounding the verification of email addresses used to create user accounts; \u2022 Clickjacking vulnerabilities; \u2022 Self XSS (i.e. where a user would need to be tricked into pasting code into their web browser); \u2022 CSRF where the resulting impact is minimal; \u2022 CRLF attacks where the resulting impact is minimal; \u2022 Host header injection where the resulting impact is minimal; \u2022 Network data enumeration techniques (e.g. banner grabbing, existence of publicly available server diagnostic pages); \u2022 Reports of improper session management / session fixation vulnerabilities. Responsible investigation and reporting includes, but is not limited to, the following rules: \u2022 Don't violate the privacy of other users, or destroy data, etc.; \u2022 Don\u2019t defraud or harm Tectum SoftNote or its users during your research; you must make a good faith effort to not interrupt or degrade our services; \u2022 Don't target our physical security measures, or attempt to use social engineering, spam, \u2022 distributed denial of service (DDOS) attacks, etc.; \u2022 Report the bug only to us and not to anyone else; \u2022 In general, please investigate and report bugs in a way that makes a reasonable, good faith effort not to be disruptive or harmful to us or our users. Otherwise your actions might be interpreted as an attack rather than an effort to be helpful.", "hash": "c2fdbc6982a1c6e415a98f92189c39b7", "id": 8}, {"size": 1, "snippet_links": [{"key": "fish-passage", "type": "definition", "offset": [11, 23]}, {"key": "in-policy", "type": "clause", "offset": [43, 52]}, {"key": "for-example", "type": "clause", "offset": [108, 119]}, {"key": "fisheries-act", "type": "clause", "offset": [170, 183]}, {"key": "high-priority", "type": "clause", "offset": [269, 282]}, {"key": "the-building", "type": "definition", "offset": [298, 310]}, {"key": "assessment-criteria", "type": "clause", "offset": [352, 371]}, {"key": "implementation-program", "type": "clause", "offset": [441, 463]}, {"key": "key-elements", "type": "clause", "offset": [477, 489]}, {"key": "removal-of", "type": "definition", "offset": [631, 641]}, {"key": "readily-available", "type": "definition", "offset": [671, 688]}, {"key": "provisions-for", "type": "clause", "offset": [724, 738]}, {"key": "small-and-medium", "type": "clause", "offset": [739, 755]}], "samples": [{"hash": "eWFD1SGJ5wM", "uri": "http://www.onlyoneplanet.com/Adelaide-water-law.doc", "label": "www.onlyoneplanet.com", "score": 5.3552361396, "published": false}], "snippet": "means that fish passage provisions are set in policy or statute, but not effectively implemented. Tasmania, for example, has strong fish passage provisions in the Inland Fisheries Act, however they are not effectively implemented - in a political climate that places a high priority on encouraging the building of dams. Fish passage is included in the assessment criteria for medium and large dam proposals. \"Strong\" means that an effective implementation program is underway. Key elements of implementation include: (a) accurate mapping and auditing of dams, weirs, and other impediments; (b) a program for the identification and removal of unnecessary impediments; (c) readily available written guidelines on fish passage provisions for small and medium dams are available; (d) policy requires all new major on-stream dams must have fish passage facilities.", "hash": "7de26c99eece2b490fc58087631c7220", "id": 9}, {"size": 1, "snippet_links": [], "samples": [{"hash": "7YNSaCBZEnh", "uri": "https://d-nb.info/1136699341/34", "label": "d-nb.info", "score": 6.6796714579, "published": false}], "snippet": "means built from a language with finitely many variables.", "hash": "e772b4fc221fff06d794ceaa11cb8b7c", "id": 10}], "next_curs": "ClESS2oVc35sYXdpbnNpZGVyY29udHJhY3Rzci0LEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiINd2VhayMwMDAwMDAwYQyiAQJlbhgAIAA=", "definition": {"title": "Weak", "size": 29, "snippet": "means a cheese requires little pressure to crush and is soft but not necessarily sticky like a pasty cheese.", "id": "weak", "examples": ["<strong>Weak</strong> consensus (WC) is a primitive that achieves a weaker form of agreement compared to BA: it guarantees agreement among all the parties that output a bit, but parties are allowed to output a special symbol \u22a5.", "Mk+\u03c3j j approach exploits the advantages of timestamps (e.g., T 1 and Similarly, \u2587\u2587\u2587 cannot present as a legal NAN gateway to a T 3, and T 2) and random numbers (e.g., uSMj and vN ) of the Security services comparisons [14] [17] [19] [20] [21] [22] [23] LAKA Session-Key security <strong>Weak</strong> \u221a \u221a \u221a Forward security \u221a \u221a \u221a \u221a \u221a \u221a \u221a \u221a Impersonation attack safeguard \u221a \u221a \u221a \u221a \u221a Wireless USB Laptop NAN meter and NAN gateway, respectively.", "<strong>Weak</strong> radicals, <strong>weak</strong> suppletion, and phonological indices in Semitic.", "Extremely <strong>Weak</strong> 0.25 to 1 Strong 50 to 100 Very Strong 100 to 250 The structural integrity of a rockmass will be affected by the presence of discontinuities.", "<strong>Weak</strong> or nonexistent procurement policies and management oversight can entice some employees to manipulate contracts to their personal benefit and can result in costly, wasteful, or unenforceable contracts.", "<strong>Weak</strong> crotches are defined as split or rotted wood between tow trunks of limbs that may break and fall during high winds.", "The rating scale* in summary form is: A++, A+ Superior C, C- <strong>Weak</strong> A, A- Excellent D Poor B++, B+ Good E Under regulatory supervision B, B- Fair F In liquidation C++, C+ Marginal S Rating suspended * A full description of the rating scale is available at \u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/\u2587\u2587\u2587\u2587\u2587\u2587\u2587/\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587 VSC and Protecta collect information to evaluate whether they will provide insurance cover.", "Our <strong>Weak</strong> Atomic Broadcast Oracles abstract this spontaneous total order property.", "<strong>Weak</strong> robustness, still sufficient for some applications, only requires robustness when R is not learned by the adversary.", "Observation 1: In Protocol <strong>Weak</strong> 2-Cast, player r1 does not send a single message but only participates in a passive way."], "related": [["adverse-impact-on-visibility", "Adverse impact on visibility", "Adverse impact on visibility"], ["opaque", "Opaque", "Opaque"], ["stability", "Stability", "Stability"], ["weakness", "Weakness", "Weakness"], ["hacking", "Hacking", "Hacking"]], "related_snippets": [], "updated": "2025-07-06T21:56:50+00:00"}, "json": true, "cursor": ""}}