collateral damage
kəˈlætərəl ˈdæmɪʤ-
(n)
collateral damage
(euphemism) inadvertent casualties and destruction inflicted on civilians in the course of military operations
-
collateral damage
(Mil) damage caused by a military operation, such as a bombing, to objects or persons not themselves the intended target of the attack.
Collateral damage - Accidental or unintended damage or casualties are collateral damage.
Gunrunning 's collateral damage: Mexican teens. ashingtontimes.com
Science is one step closer to producing drugs in the right place at the right time in the body, avoiding the collateral damage of untargeted treatments. the-scientist.com
He's collateral damage in the tangled Tiger Woods sex mess. nypost.com
Super-Precise Laser Scalpel Minimizes Collateral Damage. popsci.com
Sean Virani is conducting a trial into a new drug regime that may prevent collateral damage to the heart from breast cancer treatments. vancouversun.com
Starion Instruments' TLS3 Tissue Ligating Shears feature Starion's proprietary thermal welding technology, focusing thermal energy to simultaneously seal and divide soft tissue, reducing thermal spread and collateral damage. dicardiology.net
I've got collateral damage on my mind. pbs.org
The eponymous belle is one Anne Malloy (Sarah Gise), an energetic and profane beauty who was orphaned when an IRA bomb struck — collateral damage. laweekly.com
When the United States invaded Iraq seven years ago, the Baghdad Zoo became part of the collateral damage. scpr.org
Gunrunning's collateral damage: Mexican teens. ashingtontimes.com
Duqu Worm Causing Collateral Damage in a Silent Cyber-War. eweek.com
Mad Men's lockout and collateral damage. espn.go.com
North Carolina News About that anti-gay marriage amendment: Watch out for collateral damage. indyweek.com
One might assume a credit union collections staff could think a collateral protection insurance (CPI) program that tracks whether vehicles are insured and then force-places physical damage coverage, if necessary, is counter-productive. creditunionmagazine.com
Collateral damage of China's building spree, from collapsing bridges to construction site mudslides. globalpost.com
Proof: We prove that, for each feasible solution to BLOCK-ALL S , there exists another feasible solution S ′ that (i) can be represented as a pruned subtree of LCP-tree(BL) as described in the proposition and (ii) whose collateral damage is smaller or equal to S ’s.
Optimal Source-Based Filtering of Malicious Traffic
Clearly, each of these operations transforms feasible solution S , which is assumed not to be on LCP-tree(BL), into another feasible solution S ′ with smaller or equal collateral damage but on the LCP-Tree(BL).
Optimal Source-Based Filtering of Malicious Traffic
We can repeat this process for all pre fixes that are in S ’s tree but not in LCP-tree(BL), until we create a feasible solution S ′ that includes only pre fixes from LCP-tree(BL) and has smaller or equal collateral damage.
Optimal Source-Based Filtering of Malicious Traffic
Second, in a bottom-up fashion, we compute zp (F ) ∀p, F , i.e., , the minimum collateral damage needed to block all bad addresses in the subtree of pre fix p using at most F filters.
Optimal Source-Based Filtering of Malicious Traffic
Following a dynamic programming (DP) approach, we can find the optimal allocation of filters in the subtree rooted at pre fix p, by finding a value n and assigning F − n filters to the left subtree and n to the right subtree, so as to minimize collateral damage.
Optimal Source-Based Filtering of Malicious Traffic