C--

Results: 504177



#Item
261Climate change / Climate change mitigation / Climatology / Physical geography / Carbon dioxide / Climate engineering / Bio-energy with carbon capture and storage / Biomass / Climate change policy / Low-carbon economy / Global warming

Characteristics of four illustrative model pathways Different mitigation strategies can achieve the net emissions reductions that would be required to follow a pathway that limits global warming to 1.5°C with no or limi

Add to Reading List

Source URL: ipcc.ch

Language: English - Date: 2018-10-15 09:46:52
262Software engineering / Computing / Computer programming / Functional languages / High-level programming languages / Object-oriented programming / Data types / Programming paradigms / JavaScript / Scope / Operational semantics / Semantics

An Operational Semantics for JavaScript? Sergio Maffeis1 , John C. Mitchell2 , Ankur Taly2 , 1 2 Department of Computing, Imperial College London

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
263Software engineering / Computer programming / Computing / Method / Object-oriented programming / Data types / High-level programming languages / Dynamic dispatch / Polymorphism / Virtual method table / Method overriding / Objective-C

S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2018-10-18 11:22:47
264Software engineering / Computing / Theoretical computer science / Type theory / Data types / Logic in computer science / Edsger W. Dijkstra / Substructural logic / Separation logic / Type system / Haskell / Subtyping

c Copyright 2014 Colin S. Gordon Verifying Concurrent Programs by Controlling Alias Interference

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-22 12:11:10
265Brief / Supreme Court of the United States

DATE FILED: May 4, 2018 Colorado Supreme Court 2 East 14th Avenue Denver, COOriginal Proceeding Pursuant to §), C.R.S)

Add to Reading List

Source URL: www.courts.state.co.us

Language: English - Date: 2018-05-07 11:32:12
266Law / Terms of service / Privacy law / Information governance / Privacy / Information privacy / Digital rights / Human rights / Internet privacy / Privacy policy / Personally identifiable information / EUUS Privacy Shield

Privacy Policy Effective date: 21 May 2018 This is the privacy policy ("​Privacy Policy​") for information collected by GV Management Company, L.L.C. or GV UK Management Company Limited (together “​GV​”) and

Add to Reading List

Source URL: www.gv.com

Language: English - Date: 2018-10-11 17:01:09
267Economy / Business / E-commerce / Payment systems / Merchandising / Consumer behaviour / Online shopping / Product return / Receipt / Credit card / Purchasing / Value-added tax

Terms and Conditions By purchasing goods from NBN International or its partners the customer accepts the terms herein. NBN International or its partners: 1. Will keep the customer informed of changes to these Terms and C

Add to Reading List

Source URL: distribution.nbni.co.uk

Language: English - Date: 2016-07-08 09:00:14
268

Leveraging Internet Background Radiation for Opportunistic Network Analysis Karyn Benson∗† , Alberto Dainotti† , kc claffy† , Alex C. Snoeren∗ , Michael Kallitsis‡ ∗ Computer Science and Engineering, UC Sa

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2018-09-13 19:48:51
    269Cryptography / Computational hardness assumptions / Decisional DiffieHellman assumption / Computational DiffieHellman assumption / Decision Linear assumption / DiffieHellman problem / Learning with errors / Weight / Provable security / IP / XDH assumption / Ideal lattice cryptography

    Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

    Add to Reading List

    Source URL: eftychis.org

    Language: English - Date: 2018-02-16 15:03:09
    270Philosophy / Epistemology / Philosophy of science / Epistemology of science / Analytic philosophy / Scientific method / Falsifiability / Science / Hypothetico-deductive model / Scientific theory / Occam's razor / Theory

    SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit Cormac Herley P.C. van Oorschot

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:02:01
    UPDATE