ALI

Results: 6742



#Item
71

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users Stevens Le Blond Pere Manils Abdelberi Chaabane Mohamed Ali Kaafar Claude Castelluccia Arnaud Legout Walid Dabbous I.N.R.I.A, Fra

Add to Reading List

Source URL: planete.inrialpes.fr

Language: English - Date: 2011-04-22 10:22:02
    72

    TLS in the wild: An Internet-wide analysis of TLS-based protocols for electronic communication Ralph Holz∗ , Johanna Amann‡ , Olivier Mehani† , Matthias Wachs§ , Mohamed Ali Kaafar† ∗ University of Sydney, Au

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2017-10-16 19:29:52
      73

      Whole genome alignments and synteny in Arabidospis a) Go to the Location tab or ‘Region in detail’ page of the Arabidopsis FUM1 gene and configure the page to turn on the genome alignments (known as BLASTz/LASTz ali

      Add to Reading List

      Source URL: ftp.ebi.ac.uk

      Language: English - Date: 2018-03-06 08:50:03
        74

        PHYSICAL REVIEW X 6, Cycling State that Can Lead to Glassy Dynamics in Intracellular Transport Monika Scholz,1,2 Stanislav Burov,3 Kimberly L. Weirich,1,2 Björn J. Scholz,4,5,6 S. M. Ali Tabei,7 Margaret

        Add to Reading List

        Source URL: squishycell.uchicago.edu

        Language: English - Date: 2018-04-02 16:27:30
          75

          ASSOCI AZIONE IT ALI AN A DI DIRITTO M ARITTI MO 10 VIA ROMAGENOVA Tel. Fax

          Add to Reading List

          Source URL: www.aidim.org

          Language: English - Date: 2016-01-19 07:29:28
            76

            Exploiting the Synergy Between Gossiping and Structured Overlays Ali Ghodsi Seif Haridi

            Add to Reading List

            Source URL: fireless.cs.cornell.edu

            Language: English - Date: 2010-07-22 17:21:14
              77

              Sensor fusion for motion processing and visualization Ali Baharev, PhD TÁMOP 4.2.2 “Szenzorhálózat alapú adatgyűjtés és információfeldolgozás” workshop

              Add to Reading List

              Source URL: reliablecomputing.eu

              Language: English - Date: 2017-08-25 09:01:41
                78

                Lockout: Efficient Testing for Deadlock Bugs ∗ Ali Kheradmand School of Computer and

                Add to Reading List

                Source URL: dslab.epfl.ch

                Language: English - Date: 2018-08-14 09:29:24
                  79

                  Saklı Markov Model Karı¸sımları için Spektral Ö˘grenme Spectral Learning of Mixtures of Hidden Markov Models Yusuf Cem Sübakan1 , Oya Çeliktutan1 , Ali Taylan Cemgil2 , Bülent Sankur1 Elektrik-Elektronik Mühe

                  Add to Reading List

                  Source URL: cal.cs.illinois.edu

                  Language: Turkish - Date: 2016-12-12 13:41:19
                    80

                    Obvestilo o varovanju zasebnosti družbe Johnson Controls Družba Johnson Controls International plc. in z njo povezane družbe (skupno Johnson Controls ali mi, nas ali naše) cenijo vašo zasebnost in so zavezane varova

                    Add to Reading List

                    Source URL: www.johnsoncontrols.com

                    Language: Slovenian - Date: 2017-10-24 10:24:25
                      UPDATE