and Computation

Results: 3364



#Item
71

Exploit Programming From Buffer Overflows to “Weird Machines” and Theory of Computation Se r g e y B r a t u s , M i c h a e l E . L o c a s t o , M e r e d i t h L . P a t t e r s o n , Le n S a s s a m a n , a n d

Add to Reading List

Source URL: langsec.org

Language: English - Date: 2011-12-01 04:09:18
    72Mathematics / Abstract algebra / Algebra / Field theory / Modular forms / p-adic numbers / Number theory / Algebraic geometry / Valuation / P-adic modular form / P-adic number / Constructible universe

    577 Documenta Math. Computation of p-Adic Heights and Log Convergence In celebration of John Coates’ 60th birthday

    Add to Reading List

    Source URL: www.emis.de

    Language: English - Date: 2007-06-26 11:33:50
    73

    Eliminating unpredictable linguistic variation through interaction Kenny Smith () & Olga Feh´er Language Evolution and Computation Research Unit, School of Philosophy, Psychology & Language Sciences,

    Add to Reading List

    Source URL: www.lel.ed.ac.uk

    Language: English - Date: 2017-03-17 12:58:54
      74

      Article pubs.acs.org/jcim Computation of Induced Dipoles in Molecular Mechanics Simulations Using Graphics Processors Frederico Pratas,† Leonel Sousa,† Johannes M. Dieterich,‡ and Ricardo A. Mata‡,*

      Add to Reading List

      Source URL: www.inesc-id.pt

      Language: English - Date: 2012-06-07 01:44:14
        75

        Lecture Notes on Fair Division∗ Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam 7 April 2010

        Add to Reading List

        Source URL: staff.fnwi.uva.nl

        Language: English - Date: 2010-04-07 13:54:46
          76

          From Natural Science to Information Science and Back Russel Caflisch (UCLA) ABSTRACT The arrival of massive amounts of data from imaging, sensors, computation and the internet brought with it significant challenges for i

          Add to Reading List

          Source URL: www.math.sci.hokudai.ac.jp

          Language: English - Date: 2013-04-22 22:38:02
            77

            Software Design for PDEs on GPUs Matthew Knepley Computation Institute University of Chicago Department of Molecular Biology and Physiology Rush University Medical Center

            Add to Reading List

            Source URL: fperez.org

            Language: English - Date: 2011-03-12 15:59:03
              78

              In 37th IEEE Symposium on Security and Privacy (“Oakland”), San Jose, MayRevisiting Square-Root ORAM Efficient Random Access in Multi-Party Computation Samee Zahur∗ Xiao Wang†

              Add to Reading List

              Source URL: jackdoerner.net

              Language: English - Date: 2017-09-04 23:01:23
                79

                Secure Computation using Leaky Tokens Manoj Prabhakaran1 , Amit Sahai2 , and Akshay Wadia3

                Add to Reading List

                Source URL: mmp.cs.illinois.edu

                Language: English - Date: 2016-02-10 12:29:51
                  80

                  Using intrinsic complexity of turn-taking games to predict participants’ reaction times Jakub Szymanik () Institute for Logic, Language and Computation, University of Amsterdam Ben Meijering (b

                  Add to Reading List

                  Source URL: mindmodeling.org

                  Language: English - Date: 2013-07-15 14:53:48
                    UPDATE