Anonymous

Results: 6203



#Item
551

A Bunch of Thyme TablEdited by Paul Dingle Anonymous Irish Air  

Add to Reading List

Source URL: everythingdulcimer.com

- Date: 2015-01-31 20:25:13
    552Software engineering / Computer programming / Computing / Type theory / Data types / Polymorphism / Object-oriented programming / Subroutines / Covariance and contravariance / Parameter / Type system / Anonymous function

    Julia: A Fast Dynamic Language for Technical Computing Jeff Bezanson∗ MIT Stefan Karpinski† MIT

    Add to Reading List

    Source URL: karpinski.org

    Language: English - Date: 2016-04-13 16:19:52
    553

    Two exhibitions Werner Bischof, Point of View and Helvetica Anonymous. Urban Life in Contemporary photography.2016 Werner Bischof / Anonymous

    Add to Reading List

    Source URL: www.elysee.ch

    Language: English - Date: 2016-01-21 04:43:59
      554Computing / Cryptography / Secure communication / Security / Internet privacy / Crypto-anarchism / Mix network / Traffic analysis / Mixminion / Anonymous remailer / Denial-of-service attack / Len Sassaman

      Heartbeat Traffic to Counter (n-1) Attacks Red-Green-Black Mixes George Danezis Anonymizer, IncMission Center Road, PMB 426

      Add to Reading List

      Source URL: www0.cs.ucl.ac.uk

      Language: English - Date: 2013-10-10 06:48:57
      555

      How To Search The Scriptures The one willing prescription of providers and download qualifications understand in a anonymous How to Search the Scriptures agencies is in you do own. Almost, center decisions look later muc

      Add to Reading List

      Source URL: zinnidesign.com

      Language: English - Date: 2016-04-17 05:54:29
        556

        Peer-to-Peer Anonymous Networking Using Coding Christopher S. Chang1 , Tracey Ho2 , and Michelle Effros2 Abstract— In this paper, we consider design and analysis of coding-based anonymous routing systems in peer-to-pee

        Add to Reading List

        Source URL: www.its.caltech.edu

        Language: English - Date: 2012-10-08 23:45:00
          557

          The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems MATTHEW K. WRIGHT, MICAH ADLER, and BRIAN NEIL LEVINE University of Massachusetts Amherst and CLAY SHIELDS

          Add to Reading List

          Source URL: www.ists.dartmouth.edu

          Language: English - Date: 2008-09-11 13:39:25
            558

            Press Release (modified version) Oeuvre of Hieronymus Bosch expanded with newly discovered drawing Den Bosch, Holland, 31 OctoberAn until-now anonymous drawing “Infernal Landscape” has been recognised by the

            Add to Reading List

            Source URL: www.hetnoordbrabantsmuseum.nl

            Language: English - Date: 2015-12-17 08:08:16
              559

              Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions Ethan Heilman, Foteini Baldimtsi, and Sharon Goldberg Boston University {heilman, foteini}@bu.edu,

              Add to Reading List

              Source URL: fc16.ifca.ai

              Language: English - Date: 2016-01-27 10:23:44
                560

                AnonySense: A System for Anonymous Opportunistic Sensing Minho Shin a , Cory Cornelius a , Dan Peebles a , Apu Kapadia b David Kotz a , Nikos Triandopoulos c a Institute b School

                Add to Reading List

                Source URL: www.ists.dartmouth.edu

                Language: English - Date: 2010-08-19 11:27:36
                  UPDATE