Analysis

Results: 187493



#Item
61MATHEMATICS OF COMPUTATION Volume 81, Number 279, July 2012, Pages 1487–1511 SArticle electronically published on February 17, 2012  PERTURBATION ANALYSIS OF THE QR FACTOR R

MATHEMATICS OF COMPUTATION Volume 81, Number 279, July 2012, Pages 1487–1511 SArticle electronically published on February 17, 2012 PERTURBATION ANALYSIS OF THE QR FACTOR R

Add to Reading List

Source URL: perso.ens-lyon.fr

Language: English - Date: 2017-06-27 04:39:37
62Context-Aware Text Representation for Social Relation Aided Sentiment Analysis Minh Luan Nguyen Institute for Infocomm Research Singapore

Context-Aware Text Representation for Social Relation Aided Sentiment Analysis Minh Luan Nguyen Institute for Infocomm Research Singapore

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:56:00
63Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
64Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France  CEA LIST, Software Reliability and Security Laborator

Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France CEA LIST, Software Reliability and Security Laborator

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-09-15 19:04:15
65Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System∗ Gur Huberman Jacob D. Leshno

Monopoly without a Monopolist: An Economic Analysis of the Bitcoin Payment System∗ Gur Huberman Jacob D. Leshno

Add to Reading List

Source URL: moallemi.com

Language: English - Date: 2017-12-19 16:42:18
66Static Analysis and Runtime-Assertion Checking: Contribution to Security Counter-Measures Dillon Pariente1 and Julien Signoles2   1

Static Analysis and Runtime-Assertion Checking: Contribution to Security Counter-Measures Dillon Pariente1 and Julien Signoles2 1

Add to Reading List

Source URL: julien.signoles.free.fr

Language: English - Date: 2017-08-11 12:57:48
67An Analysis of the Tariff Discrimination Potential of the TransPacific Partnership against Swiss Companies and their Exports  Consequences of TPP for Swiss Companies  OFFICIAL PROGRAM

An Analysis of the Tariff Discrimination Potential of the TransPacific Partnership against Swiss Companies and their Exports Consequences of TPP for Swiss Companies OFFICIAL PROGRAM

Add to Reading List

Source URL: www.seco.admin.ch

Language: English
68AVACS*  Automatic Verification and Analysis of Complex Systems Werner Damm AVACS coordinator

AVACS* Automatic Verification and Analysis of Complex Systems Werner Damm AVACS coordinator

Add to Reading List

Source URL: www.avacs.org

Language: English - Date: 2015-09-28 03:05:31
69MyBion Our	service	uses	nanopore	DNA	 sequencing	coupled	with	real-time data	analysis	to	help	infectious	 disease	patients.	We	offer	 physicians	a	better	way	to	reach

MyBion Our service uses nanopore DNA sequencing coupled with real-time data analysis to help infectious disease patients. We offer physicians a better way to reach

Add to Reading List

Source URL: docs.wixstatic.com

Language: English - Date: 2018-01-24 08:32:39
70Demand-Driven Context-Sensitive Alias Analysis for Java Dacong Yan Guoqing Xu  Atanas Rountev

Demand-Driven Context-Sensitive Alias Analysis for Java Dacong Yan Guoqing Xu Atanas Rountev

Add to Reading List

Source URL: dacongy.github.io

Language: English - Date: 2017-06-27 01:04:15