Abstract

Results: 68258



#Item
271Military / Children's rights / Youth rights / Military sociology / Child soldiers / Human rights abuses / Children in the military / Child Soldiers International / United Nations / Geneva Call / Peacekeeping / Child soldiers in Africa

Microsoft Word - JOURNEYS ABSTRACT.docx

Add to Reading List

Source URL: www.saramitchell.org

Language: English - Date: 2018-10-21 14:40:02
272Cryptocurrencies / Blockchains / Concurrent computing / Computing / Bitcoin / Decentralization / Alternative currencies / Distributed computing / Ethereum / Decentralized application / ternity

Celer Network: Bring Internet Scale to Every Blockchain ScaleSphere Foundation Ltd. (“Foundation”) June 15, 2018 Draft, subject to change. Abstract. Just like how the 56Kbps dialup Internet in the 90s cannot possibl

Add to Reading List

Source URL: www.celer.network

Language: English - Date: 2018-10-23 01:41:06
273Computing / Hierarchical clustering / Network analysis / Information science / Cluster analysis / Data analysis / K-means clustering / Computer cluster / Nearest-neighbor chain algorithm / Document clustering

Balanced Clustering for Content-based Image Browsing Tim Althoff, Adrian Ulges, Andreas Dengel German Research Center for Artificial Intelligence (DFKI) and University of Kaiserslautern Abstract: In r

Add to Reading List

Source URL: www.timalthoff.com

Language: English - Date: 2012-11-20 09:30:50
274Cryptography / Data Encryption Standard / Linear cryptanalysis / Differential cryptanalysis / Block cipher / Salsa20 / Cryptanalysis / Differential-linear attack / NC / Boomerang attack / Stream cipher / E0

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
275

An Overview of M AR Q Giles Reger University of Manchester, Manchester, UK Abstract. MarQ is a runtime monitoring tool for specifications written as quantified event automata, an expressive automata-based specification l

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2016-09-22 17:48:28
    276Mathematical logic / Logic / Theoretical computer science / Logic in computer science / Runtime verification / FO / Quantifier

    M AR Q: Monitoring At Runtime with QEA Giles Reger, Helena Cuenca Cruz and David Rydeheard University of Manchester Abstract. Runtime monitoring is the process of checking whether an execution trace of a running system s

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2016-07-20 13:13:50
    277Design of experiments / Causal inference / Observational study / Metaphysics / Statistics / Estimation theory / Probability and statistics / Regression analysis / Propensity score matching / Matching / Confounding / Average treatment effect

    Adjusting for Confounding with Text Matching∗ Margaret E. Roberts†, Brandon M. Stewart‡, and Richard A. Nielsen§ February 27, 2018¶ Abstract We identify situations in which conditioning on text can address confou

    Add to Reading List

    Source URL: scholar.princeton.edu

    Language: English - Date: 2018-02-27 08:48:12
    278Mathematics / Abstract algebra / Algebra / Functors / Category theory / Homological algebra / Algebraic topology / Adjoint functors / Natural transformation / Yoneda lemma / Limit / Universal property

    QUADRATIC FUNCTORS ON POINTED CATEGORIES MANFRED HARTL & CHRISTINE VESPA Abstract. We study polynomial functors of degree 2, called quadratic, with values in the category of abelian groups Ab, and whose source category i

    Add to Reading List

    Source URL: irma.math.unistra.fr

    Language: English - Date: 2010-12-09 08:31:47
    279Algebra / Abstract algebra / Mathematics / Lie groups / Post-quantum cryptography / Algebraic structures / Lattice-based cryptography / Analytic geometry / Lattice / Field extension / Ring / Order

    Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-06-25 14:23:34
    280Software / Computing / Computer programming / Integrated development environments / JetBrains / SonarQube / IntelliJ IDEA / FindBugs / Eclipse / Java / NetBeans / Cppcheck

    Poster: IDE Plugins for Secure Coding Aniqua Z. Baset University of Utah Abstract—Many vulnerabilities in products and systems could

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 03:19:52
    UPDATE