.properties

Results: 16788



#Item
1GRADUATE SEMINAR Salma Faraj Ibrahim Saad Asymptotic Properties of Estimators of Parameters for the Binomial Distribution by Method of Moments PhD Student supervised by Drs. S. Hossain and A.Volodin

GRADUATE SEMINAR Salma Faraj Ibrahim Saad Asymptotic Properties of Estimators of Parameters for the Binomial Distribution by Method of Moments PhD Student supervised by Drs. S. Hossain and A.Volodin

Add to Reading List

Source URL: www.uregina.ca

Language: English - Date: 2018-05-30 16:29:16
2Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Cryptographic Hardware (named Myst) that enables cryptographic devices to maintain their security properties in the from presence of malicious hardware components. UnUntrusted Components like prior mitigation efforts tha

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
3Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer  Science and Engineering, University of California, San Di

Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer Science and Engineering, University of California, San Di

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
    4Shadow State Encoding for Efficient Monitoring of Block-Level Properties Kostyantyn Vorobyov Julien Signoles

    Shadow State Encoding for Efficient Monitoring of Block-Level Properties Kostyantyn Vorobyov Julien Signoles

    Add to Reading List

    Source URL: julien.signoles.free.fr

    Language: English - Date: 2017-08-11 12:57:26
      5Voting Theory  AAAI-2010 Voting Procedures and their Properties

      Voting Theory AAAI-2010 Voting Procedures and their Properties

      Add to Reading List

      Source URL: formal.iti.kit.edu

      Language: English - Date: 2016-07-22 17:04:25
      6Geometry & Topology–Topological properties of Hilbert schemes of almost-complex four-manifolds II

      Geometry & Topology–Topological properties of Hilbert schemes of almost-complex four-manifolds II

      Add to Reading List

      Source URL: jgrivaux.perso.math.cnrs.fr

      Language: English - Date: 2016-04-27 12:14:31
      7Probabilistic Model Checking Christel Baier, Luca de Alfaro, Vojtˇech Forejt, and Marta Kwiatkowska Abstract The model-checking approach was originally formulated for verifying qualitative properties of systems, for exa

      Probabilistic Model Checking Christel Baier, Luca de Alfaro, Vojtˇech Forejt, and Marta Kwiatkowska Abstract The model-checking approach was originally formulated for verifying qualitative properties of systems, for exa

      Add to Reading List

      Source URL: qav.comlab.ox.ac.uk

      Language: English - Date: 2016-04-21 06:03:55
      8Towards a Logic for Inferring Properties of Event Streams? Sean Kauffman1 , Rajeev Joshi2 , and Klaus Havelund2 1  2

      Towards a Logic for Inferring Properties of Event Streams? Sean Kauffman1 , Rajeev Joshi2 , and Klaus Havelund2 1 2

      Add to Reading List

      Source URL: rjoshi.org

      Language: English - Date: 2018-01-10 13:23:57
      9First properties of Gushel–Mukai manifolds Hodge structures and period maps EPW sextics Back to periods Rationality questions

      First properties of Gushel–Mukai manifolds Hodge structures and period maps EPW sextics Back to periods Rationality questions

      Add to Reading List

      Source URL: www.math.ens.fr

      Language: English - Date: 2016-06-07 10:03:06
      10Certified Verification of Algebraic Properties on LowLevel Mathematical Constructs in Cryptographic Programs Ming-Hsien Tsai Bow-Yaw Wang  Bo-Yin Yang

      Certified Verification of Algebraic Properties on LowLevel Mathematical Constructs in Cryptographic Programs Ming-Hsien Tsai Bow-Yaw Wang Bo-Yin Yang

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2018-03-14 01:29:40