B

Results: 347007



#Item
131Information theory / Statistical theory / Probability and statistics / Consumer behaviour / Consumer theory / Marketing performance measurement / Probability / Prior probability / Conditional probability / Privacy / Advantage / Entropy

Quantifying Location Privacy Leakage from Transaction Prices Arthur Gervais1(B) , Hubert Ritzdorf1 , Mario Lucic1 , Vincent Lenders2 , and Srdjan Capkun1 1

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2016-11-01 06:37:08
132Machine learning / Artificial intelligence / Learning / Mathematics / Sparse approximation / Semantic memory / Regularization / Supervised learning / Semantic network / Sparse matrix / Dense graph

Discovering Structure by Learning Sparse Graphs Brenden M. Lake and Joshua B. Tenenbaum Department of Brain and Cognitive Sciences Massachusetts Institute of Technology {brenden, jbt}@mit.edu Abstract

Add to Reading List

Source URL: cims.nyu.edu

Language: English - Date: 2011-02-04 14:34:11
133Theoretical computer science / Theory of computation / Computer programming / Mathematics / Computability theory / Digital signal processing / Computer arithmetic / Algorithm / Mathematical logic / Recursion / Multiplyaccumulate operation / Time complexity

Behavioral Non-portability in Scientific Numeric Computing Yijia Gu1(B) , Thomas Wahl1 , Mahsa Bayati2(B) , and Miriam Leeser2 1 2

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2015-10-13 09:30:58
134Cryptocurrencies / Blockchains / Ethereum / Cross-platform software / Alternative currencies / Concurrent computing / Distributed computing / Smart contract / EIP / Computing / Ethereum Classic

Breaking down the EIP-999 debate Pros, Cons… and e v e r y t h i n g in b e t w e e n. Where it all starts: The Parity Hack

Add to Reading List

Source URL: edcon.io

Language: English - Date: 2018-10-16 07:02:08
135Law / Criminal law / Legal professions / Criminal procedure / Bail in the United States / United States criminal law / Bail / Excessive Bail Clause / Stack v. Boyle / Bounty hunter / Remand / Arrest

1 The History of Bail and Pretrial Release Updated September 24, 2010 Timothy R. Schnacke,

Add to Reading List

Source URL: b.3cdn.net

Language: English - Date: 2013-07-01 12:42:51
136

Nursing, BS "DBEFNJD.BQ  5IF"DBEFNJD.BQTFSWFTBTBTVHHFTUFEDPVSTFTFRVFODFPOMZ4UVEFOUTBSFOPUMJNJUFEUPUIJTQMBOJUJTNFBOUUPCFVTFEBT

Add to Reading List

Source URL: catalog.southernct.edu

Language: English - Date: 2018-10-06 18:04:29
    137Course / Curricula

    Anthropology, BA "DBEFNJD.BQ  5IF"DBEFNJD.BQTFSWFTBTBTVHHFTUFEDPVSTFTFRVFODFPOMZ4UVEFOUTBSFOPUMJNJUFEUPUIJTQMBOJUJTNFBOUUPCFVTFEBT

    Add to Reading List

    Source URL: catalog.southernct.edu

    Language: English - Date: 2018-10-06 18:04:25
    138Medical education / Large ElectronPositron Collider / Elective / Internship

    History, BA "DBEFNJD.BQ  5IF"DBEFNJD.BQTFSWFTBTBTVHHFTUFEDPVSTFTFRVFODFPOMZ4UVEFOUTBSFOPUMJNJUFEUPUIJTQMBOJUJTNFBOUUPCFVTFEBT

    Add to Reading List

    Source URL: catalog.southernct.edu

    Language: English - Date: 2018-10-06 18:05:36
    139Mathematical logic / Theoretical computer science / Software / Formal methods / Proof assistants / Automated theorem proving / Mathematical proof / First-order logic / Proof / True quantified Boolean formula / Frama-C / Type theory

    Designing Proof Formats A User’s Perspective Sascha B¨ ohme

    Add to Reading List

    Source URL: user.it.uu.se

    Language: English - Date: 2011-08-05 14:21:30
    140Cryptography / Disk encryption / Cryptographic software / Dm-crypt / Symmetric-key algorithm / Comparison of disk encryption software / AES implementations

    E M S C B – Milestone No. I Turaya.Crypt – Secure Linux Hard-Disk Encryption DESIGN SPECIFICATION based on European Multilaterally Secure Computing Base (EMSCB)

    Add to Reading List

    Source URL: www.emscb.de

    Language: English - Date: 2011-05-11 05:57:21
    UPDATE