
// analysis, feedback, and pattern matching... Dude, where's my code? http://phys.org/news/2013-10-dude-code.html (re: paper is titled "Towards Optimization-Safe Systems: Analyzing the Impact of Undefined Behavior." // Stack) Birds on repeat: Do playbacks hurt fowl? http://phys.org/news/2013-10-birds-playbacks-fowl.html (context is of birdcall networks & modem protocols, perhaps this issue of emulation relevant to security protocols, monitoring, attack strategy- or not) Cuckoos impersonate hawks by matching their 'outfits' http://phys.org/news/2013-10-cuckoos-impersonate-hawks-outfits.html (crazy cuckoo birds impersonate hawks, exploit of localized overlapping pattern matching. potential comp.security or software systems correlation, beyond poli-sci)