Analysis

Results: 187493



#Item
131Server hardware / Computer architecture / Computing / Itanium / Blade server / IBM System p

Full-System Power Analysis and Modeling for Server Environments D. Economou, S. Rivoire, C. Kozyrakis, P. Ranganathan Stanford University / HP Labs Workshop on Modeling, Benchmarking, and Simulation (MoBS)

Add to Reading List

Source URL: rivoire.cs.sonoma.edu

Language: English - Date: 2017-05-29 18:44:41
132Cryptocurrencies / Ethereum / Alternative currencies / Blockchains / Numismatics / Economy / Money / Cross-platform software / Initial coin offering / Token / Kin / Draft:Bancor protocol

A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog

Add to Reading List

Source URL: hacken.io

Language: English - Date: 2017-10-12 11:57:44
133Formal methods / Algebraic structures / Abstract interpretation / Refinement / Lattice / Universal quantification / Mathematics / Computing / Theoretical computer science

SMT-Style Program Analysis SMT-Style Program Analysis with Value-based Refinements Vijay D’Silva

Add to Reading List

Source URL: www.lix.polytechnique.fr

Language: English - Date: 2010-07-21 10:31:14
134

An Empirical
 
 An Empirical Analysis of Anonymity in Zcash
 


Add to Reading List

Source URL: georgekap.github.io

- Date: 2018-09-14 13:39:28
    135Computing / Computer programming / Software engineering / Abstract data types / C++ Standard Library / Associative containers / Intermodal container / Container / Iterator / Java / Static single assignment form

    Dynamic Analysis of Inefficiently-Used Containers Shengqian Yang1 1 Dacong Yan1

    Add to Reading List

    Source URL: dacongy.github.io

    Language: English - Date: 2017-06-27 01:04:15
    136Graph theory / Network theory / Bipartite graphs / Graph operations / Centrality / Network analysis / Distance / Graph / Connectivity / Tree / Shortest path problem / Degeneracy

    Structural Properties in δ-Hyperbolic Networks: Algorithmic Analysis and Implications Hend Alrasheed Kent State University, Department of Computer Science Kent Ohio, USA

    Add to Reading List

    Source URL: gdac.uqam.ca

    Language: English - Date: 2017-10-04 00:34:48
    137Topology / Mathematics / Theoretical physics / Algebraic topology / Symplectic topology / Homology theory / Fellows of the Royal Society / Floer homology / Orbifold / Manifold / Low-dimensional topology / Fundamental group

    Knots, three-manifolds and instantons P. B. Kronheimer and T. S. Mrowka Low-dimensional topology is the study of manifolds and cell complexes in dimensions four and below. Input from geometry and analysis has been centra

    Add to Reading List

    Source URL: eta.impa.br

    Language: English - Date: 2018-07-28 17:09:48
    138Hamiltonian mechanics / Mathematical analysis / Mathematics / Theoretical physics / Symplectic integrator / Semi-implicit Euler method / Multisymplectic integrator / Variational integrator / Leapfrog integration / Integrable system / Hamiltonian vector field / Hamiltonian system

    Dynamics, numerical analysis, and some geometry Ludwig Gauckler ∗ Ernst Hairer †

    Add to Reading List

    Source URL: eta.impa.br

    Language: English - Date: 2018-07-28 17:09:47
    139Psychiatry / Health / Psychology / Disability / Mental health / Positive psychology / Social constructionism / Counselor / Psychotherapy / Mental disorder / School counselor / Clinical mental health counseling

    Large-scale Analysis of Counseling Conversations: 
 An Application of NLP to Mental Health Tim Althoff*, Kevin Clark*, Jure Leskovec @timalthoff  

    Add to Reading List

    Source URL: www.timalthoff.com

    Language: English - Date: 2016-12-07 09:40:34
    140Computer access control / Computer security / Identity management / Federated identity / Cloud standards / OAuth / Identity provider / OpenID / Single sign-on / Authentication / Relying party / SAML-based products and services

    A Comprehensive Formal Security Analysis of OAuth 2.0 arXiv:1601.01229v3 [cs.CR] 27 MayDaniel Fett

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2018-06-14 12:33:34
    UPDATE