3-1-1

Results: 134215



#Item
1Counterexample-guided Refinement of Template Polyhedra Sergiy Bogomolov12, Goran Frehse3, Mirco Giacobbe2, and Thomas A. Henzinger2 1  3

Counterexample-guided Refinement of Template Polyhedra Sergiy Bogomolov12, Goran Frehse3, Mirco Giacobbe2, and Thomas A. Henzinger2 1 3

Add to Reading List

Source URL: repository.ist.ac.at

Language: English - Date: 2018-02-08 07:01:31
21.3  ISMS POLICY It is the policy of Porism to maintain an information management system designed to meet the requirements of ISO 27001:2013 in pursuit of its primary

1.3 ISMS POLICY It is the policy of Porism to maintain an information management system designed to meet the requirements of ISO 27001:2013 in pursuit of its primary

Add to Reading List

Source URL: porism.com

Language: English - Date: 2018-08-16 07:40:11
3Plasma  1. What’s wrong? 2. What’s happening now? 3. Plasmafication!

Plasma 1. What’s wrong? 2. What’s happening now? 3. Plasmafication!

Add to Reading List

Source URL: edcon.io

- Date: 2018-10-16 07:02:08
    4PRÊT A CHANTER: THE RULES §1 No speaking. Only vocalisations other than speaking are allowed——————§2 The number TWO is not allowed—————— §3 In this opera, speaking is considered

    PRÊT A CHANTER: THE RULES §1 No speaking. Only vocalisations other than speaking are allowed——————§2 The number TWO is not allowed—————— §3 In this opera, speaking is considered

    Add to Reading List

    Source URL: www.odrathek.org

    Language: English - Date: 2018-04-28 05:19:47
    5SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

    SHA-3 on ARM11 processors Peter Schwabe1 , Bo-Yin Yang1 , and Shang-Yi Yang2 1 ?

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2013-02-27 00:13:54
    6FBTCAn Intermediate Language for the Simulation of Biological Systems 1 Roberto Barbuti,2 Giulio Caravagna,3 Andrea Maggiolo–Schettini4 and Paolo Milazzo5

    FBTCAn Intermediate Language for the Simulation of Biological Systems 1 Roberto Barbuti,2 Giulio Caravagna,3 Andrea Maggiolo–Schettini4 and Paolo Milazzo5

    Add to Reading List

    Source URL: pages.di.unipi.it

    Language: English - Date: 2015-12-18 06:55:14
    7Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1  3

    Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:34
    8Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems Bo-Yin Yang1, , Chen-Mou Cheng2 , Bor-Rong Chen2 , and Jiun-Ming Chen3 1  3

    Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems Bo-Yin Yang1, , Chen-Mou Cheng2 , Bor-Rong Chen2 , and Jiun-Ming Chen3 1 3

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2011-03-20 04:03:40
    9Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1  3

    Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2012-04-04 23:26:12