and School

Results: 192003



#Item
31

REGISTRATION 2nd AVACS Autumn School, September 30 – October 02, 2015 in Oldenburg Credit Card Fax Form Please fill in this form and fax it to: +Your Name

Add to Reading List

Source URL: www.avacs.org

- Date: 2015-09-01 11:04:13
    32

    Georgios Fainekos School of Computing, Informatics and Decision Systems Engineering, Arizona State University. Office address: 660 W 6th St, STE, Tempe, AZweb: http://www.public.asu.edu/~gfaineko/, email: f

    Add to Reading List

    Source URL: www.public.asu.edu

    Language: English - Date: 2018-02-09 03:36:24
      33Economy / Money / Finance / Mobile payments / Payment systems / ISO standards / Mobile telecommunications / Online payments / Near-field communication / EMV / Apple Pay / Payment terminal

      Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment Maryam Mehrnezhad, Feng Hao, and Siamak F. Shahandashti School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom {m.mehrnezh

      Add to Reading List

      Source URL: homepages.cs.ncl.ac.uk

      Language: English - Date: 2015-09-24 14:01:42
      34Photographic techniques / Motion blur / Science of photography

      Your title here: Maybe add some pictures and/or school logo on the left and right authors and affiliation

      Add to Reading List

      Source URL: rpg.ifi.uzh.ch

      Language: English - Date: 2018-09-20 18:03:33
      35Computing / Internet privacy / Software / Technology / Internet censorship / Text messaging / Email / Internet censorship circumvention / Freenet / Deep packet inspection / Steganography / SMS

      Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu Abstract

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2010-06-03 17:05:03
      36Theoretical computer science / Formal methods / Mathematical logic / School of Computer Science /  University of Manchester / Mathematics / Logic in computer science / Automated theorem proving / Formal verification / SPASS / Andrei Voronkov / Vampire / First-order logic

      Testing a Saturation-Based Theorem Prover: Experiences and Challenges Giles Reger1 , Martin Suda2 , and Andrei Voronkov1,2 1 School of Computer Science, University of Manchester, UK

      Add to Reading List

      Source URL: www.cs.man.ac.uk

      Language: English - Date: 2017-07-31 12:00:20
      37Kenneth White / Ent / Kenneth Parcell

      Neo- Geopoetics You can find out more about Geo-Poetics here. At the Atlantic Islands Festival on Luing in 2009, we also held the summer school for the Scottish Centre for Geopoetics, and many of the speakers talked abou

      Add to Reading List

      Source URL: burnedthumb.co.uk

      Language: English - Date: 2018-02-07 10:17:38
      38Software / Computing / Digital media / Social media / Social networking services / Universal Windows Platform apps / Terms of service / Photo sharing / Twitter / Internet privacy / Facebook / Privacy concerns with social networking services

      Is it Really About Me? Message Content in Social Awareness Streams Mor Naaman, Jeffrey Boase, Chih-Hui Lai Rutgers University, School of Communication and Information 4 Huntington St., New Brunswick, NJ 08901, USA {mor,

      Add to Reading List

      Source URL: individual.utoronto.ca

      Language: English - Date: 2017-09-21 13:37:58
      39Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

      Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-11 13:01:38
      40Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

      A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      Language: English - Date: 2017-06-07 20:45:26
      UPDATE