and Applications

Results: 31669



#Item
11Concurrent computing / Distributed computing / Computing / Computer networking / Content delivery networks / Internet broadcasting / Content delivery network / Multimedia / Fastly / Content delivery network interconnection / Mobile CDN

Next-Generation CDNs Websites and mobile applications can’t afford to use outdated content delivery networks (CDNs), according to this new 10-page report from Gigaom Research: “Next-generation CDNs: extending custome

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2017-05-05 00:24:02
12Computer security / Security engineering / Prevention / Crime prevention / Cryptography / Information governance / National security / Data quality / Information science / Middleware / Mandatory access control / Database

SAFEWEB: A Middleware for Securing Ruby-based Web Applications Petr Hosek1 , Matteo Migliavacca1 , Ioannis Papagiannis1 , David M. Eyers2 , David Evans3 , Brian Shand4 , Jean Bacon3 , and Peter Pietzuch1 1

Add to Reading List

Source URL: srg.doc.ic.ac.uk

Language: English - Date: 2011-12-01 05:00:04
13Computer law / Artificial intelligence / Trevor Bench-Capon / JURIX / Applications of artificial intelligence to legal informatics / Leon van der Torre / Ambient intelligence / Computer science

LEGAL KNOWLEDGE AND INFORMATION SYSTEMS Frontiers in Artificial Intelligence and Applications The book series Frontiers in Artificial Intelligence and Applications (FAIA) covers all aspects of theoretical and applied A

Add to Reading List

Source URL: orbilu.uni.lu

Language: English - Date: 2017-12-20 09:25:07
14Software engineering / Computing / Modeling and simulation / Software architecture / Software design / Domain-specific language / Domain-driven design / Conceptual model / Architectural pattern / Scientific modelling / Domain-specific modeling / Feature engineering

Proceedings of Machine Learning Research, 4th International Conference on Predictive Applications and APIs An Architecture and Domain Specific Language Framework for Repeated Domain-Specific Predictive M

Add to Reading List

Source URL: proceedings.mlr.press

Language: English - Date: 2018-08-30 22:04:11
15Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of Technology

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-03-27 10:44:26
16Computing / Software engineering / Object-oriented programming languages / Programming languages / High-level programming languages / Cross-platform software / Scripting languages / Kotlin / JetBrains / Java bytecode / Apache Groovy / Nullable type

Extracted from: Programming Kotlin Creating Elegant, Expressive, and Performant JVM and Android Applications

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2018-10-22 12:45:28
17Machine learning / Networks / Feature learning / Mathematics / Probability and statistics / Applied mathematics / Artificial neural network / Community structure / Neighbourhood / Random walk

Representation Learning on Graphs: Methods and Applications arXiv:1709.05584v3 [cs.SI] 10 Apr 2018 William L. Hamilton

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-04-10 20:33:35
18Cryptocurrencies / Blockchains / Computing / Alternative currencies / Concurrent computing / Distributed computing / Ethereum / Cross-platform software / Smart contract / Bitcoin / Hyperledger / ternity

Blockchain For Financial Markets Applications and Services Harnessing the Power of Artificial Intelligence, Neural Networks and Active Leverage “At its core Qompass will provide a rich ecosystem of API protocols and

Add to Reading List

Source URL: icorating.com

Language: English
19Software engineering / Subroutines / Computing / Computer programming / Programming paradigms / Callback / Network flow problem / Event / Data-flow analysis / Control flow analysis / Flow network / Control flow graph

Static Control-Flow Analysis of User-Driven Callbacks in Android Applications Shengqian Yang, Dacong Yan, Haowei Wu, Yan Wang, and Atanas Rountev Ohio State University Email: {yangs,yan,wuhaow,wang10,rountev}@cse.ohio-st

Add to Reading List

Source URL: dacongy.github.io

Language: English - Date: 2017-06-27 01:04:15
20Cryptography / Computing / Internet / Internet protocols / Public-key cryptography / Transport Layer Security / Secure communication / Cryptographic protocols / QUIC / Transmission Control Protocol / Forward secrecy

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler‡ , Tibor Jagerk , Daniel Slamanig§ , Christoph Striecks§ May 3, 2018—Eurocrypt 2018, Tel Aviv, Israel

Add to Reading List

Source URL: david.derler.info

Language: English - Date: 2018-10-15 14:18:42
UPDATE