An

Results: 460726



#Item
331

An Empirical
 
 An Empirical Analysis of Anonymity in Zcash
 


Add to Reading List

Source URL: georgekap.github.io

- Date: 2018-09-14 13:39:28
    332Mathematics / Mathematical analysis / Calculus / Sheaf theory / Algebraic topology / Multivariable calculus / Integral calculus / D-module / Differential operator / Local system / Sheaf / Integration by parts

    AN INTRODUCTION TO D-MODULES by Jean-Baptiste Teyssier Introduction This text gathers notes of a five hours course on D-modules given for the Winter

    Add to Reading List

    Source URL: jbteyssier.com

    Language: English - Date: 2015-03-31 15:21:21
    333

    Medienmitteilung Nein zur Bürokratisierung der Internet-Domains Der Bundesrat passt diverse Verordnungen zum Fernmeldegesetz an die Entwicklungen des Marktes und der Technik an. Zusätzlich wird die Verwaltung von Inte

    Add to Reading List

    Source URL: asut.ch

    Language: German - Date: 2015-08-17 11:06:59
      334Music / Keyboard instruments / Artificial neural networks / Chordophones / Piano / Rhythm section / Long short-term memory / Reason / MIDI / Chord / Guitar chord

      Clara: Generating Polyphonic and Multi-Instrument Music Using an AWD-LSTM Architecture Christine Payne, OpenAI Scholars Program August 29, 2018 Clara is an LSTM that composes piano music and chamber music. It

      Add to Reading List

      Source URL: www.christinemcleavey.com

      Language: English - Date: 2018-08-31 13:51:14
      335

      An Overview of M AR Q Giles Reger University of Manchester, Manchester, UK Abstract. MarQ is a runtime monitoring tool for specifications written as quantified event automata, an expressive automata-based specification l

      Add to Reading List

      Source URL: www.cs.man.ac.uk

      Language: English - Date: 2016-09-22 17:48:28
        336Mathematical logic / Logic / Theoretical computer science / Logic in computer science / Runtime verification / FO / Quantifier

        M AR Q: Monitoring At Runtime with QEA Giles Reger, Helena Cuenca Cruz and David Rydeheard University of Manchester Abstract. Runtime monitoring is the process of checking whether an execution trace of a running system s

        Add to Reading List

        Source URL: www.cs.man.ac.uk

        Language: English - Date: 2016-07-20 13:13:50
        337Technology / Information and communications technology / Culture / Access to Knowledge movement / Rights / Freedom of speech / Cultural globalization / Internet access / Digital rights / Net neutrality / Access to information / Internet privacy

        www.accessnow.org Access Now response to ITU Consultation: Building an enabling environment for access to the Internet http://www.itu.int/en/council/cwg-internet/Pages/consultation-feb2016.aspx 1. What are the elements

        Add to Reading List

        Source URL: www.accessnow.org

        Language: English - Date: 2016-10-28 15:02:42
        338Cryptography / Integer factorization algorithms / Lenstra elliptic-curve factorization / Quadratic sieve / Elliptic-curve cryptography / Elliptic curve / Integer factorization / General number field sieve / RSA / Trial division

        An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method Jens Franke, Thorsten Kleinjung - University of Bonn Christof Paar, Jan Pelzl - University of Bochum Christine Priplata, Colin Stah

        Add to Reading List

        Source URL: www.hyperelliptic.org

        Language: English - Date: 2005-03-13 11:15:51
        339

        newhome.ch – Das Immobilien-Portal von 16 Kantonalbanken newhome.ch zählt heute zu den drei führenden Schweizer Immobilien-Portalen und verfügt in zahlreichen Kantonen über das umfangreichste Angebot an Immobilien

        Add to Reading List

        Source URL: www.exanic.ch

        Language: German - Date: 2018-10-26 03:08:26
          340Algebra / Abstract algebra / Mathematics / Lie groups / Post-quantum cryptography / Algebraic structures / Lattice-based cryptography / Analytic geometry / Lattice / Field extension / Ring / Order

          Characterizing overstretched NTRU attacks Gabrielle De Micheli, Nadia Heninger and Barak Shani University of Pennsylvania Abstract Overstretched NTRU, an NTRU variant with a large modulus, has been used as a building

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2018-06-25 14:23:34
          UPDATE