Yale

Results: 8900



#Item
711File sharing / Reputation management / Distributed data storage / Peer-to-peer computing / Peer-to-peer / EigenTrust / Sybil attack / Social peer-to-peer processes / Distributed hash table / Reputation system / Distributed computing / Anonymous P2P

Taxonomy of Trust: Categorizing P2P Reputation Systems ! Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}cs.stanford.edu

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-11-08 11:13:55
712Eruv / Orthodox Judaism / New Haven /  Connecticut / YaleNew Haven Hospital

ACCESS TO YALE NEW HAVEN HOSPITAL VIA THE ERUV N.B. ONLY the Maternity and Children’s Emergency Entrances can be accessed through the Eruv. However, once INSIDE the hospital, all adjoining areas can be accessed. Please

Add to Reading List

Source URL: www.newhaventorahcenter.org

Language: English - Date: 2015-11-16 10:23:10
713Evolutionary biology / Evolution / Punctuated equilibrium / Natural selection / Stephen Jay Gould / Unit of selection / The Structure of Evolutionary Theory / Spandrel / Exaptation / Modern evolutionary synthesis / Speciation / Microevolution

2339 BOOK REVIEWS Evolution, 56(11), 2002, pp. 2339–2345 LESS WOULD HAVE BEEN MORE1

Add to Reading List

Source URL: stearnslab.yale.edu

Language: English - Date: 2013-09-23 16:51:24
714Public-key cryptography / Public key infrastructure / RSA / Schmidt-Samoa cryptosystem

Answers to Practice Questions for Exam 1 (Crypto Basics) Answer 1-Crypto: a) The three basic requirements that we discussed in class are: 1. Cryptosystem security: Roughly speaking, it must be infeasible for an eavesdrop

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-10-15 14:07:47
715Type theory / Data types / Functional programming / Functional languages / Literate programming / Monad / Haskell / Algebraic data type / Pattern matching / Kind / Polymorphism / Type inference

A Gentle Introduction to Haskell 98 Paul Hudak John Peterson Yale University

Add to Reading List

Source URL: www.haskell.org

Language: English - Date: 2015-02-01 22:32:43
716Decision theory / Utility / Game theory / Expected utility hypothesis / X-ray photoelectron spectroscopy / Expected value / Accountability

Towards a Formal Model of Accountability ∗ Joan Feigenbaum Department of Computer

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2011-10-31 10:40:46
717Advertising / Targeted advertising / Internet privacy / Privacy / Online advertising

An Economic Analysis of User-Privacy Options in Ad-Supported Services Joan Feigenbaum1, , Michael Mitzenmacher2, , and Georgios Zervas1, 1 2

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2012-12-24 13:41:06
718Routing algorithms / Link-state routing protocol / Routing / Shortest path problem / Multipath routing / Wireless Routing Protocol

Subjective-Cost Policy Routing ⋆ Joan Feigenbaum a,1 a Yale University Computer Science Department, 51 Prospect St., New Haven, CT 06511, USA.

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2008-02-16 15:53:17
719Human rights / Identity management / Law / Privacy / Internet privacy / Private information retrieval / Communications protocol

Abstract Implementation and Evaluation of Privacy-Preserving Protocols Felipe Saint-Jean Antonijevic 2010

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2010-08-16 09:48:18
720Monopoly / Business law / Intellectual property law / International trade / Copyright law / WIPO Copyright Treaty / Anti-circumvention / World Intellectual Property Organization / Berne Convention / Copyright / Intellectual property / Digital Millennium Copyright Act

International Copyright in a Digital Environment Christina Wallin CPSC 457, Fall 2011

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-09-29 10:36:20
UPDATE