CC

Results: 30042



#Item
1

Software-basierte Mikroarchitekturangriffe1 Daniel Gruss2 Abstract: Moderne Prozessoren sind hoch optimierte Systeme, bei denen jeder einzelne Rechenzeitzyklus von Bedeutung ist. Viele Optimierungen h¨angen von den Date

Add to Reading List

Source URL: gruss.cc

Language: German - Date: 2018-09-28 10:46:40
    2Differentiation rules / Number theory / Polynomials / Lie algebras / Smooth functions

    CC(X): Efficiently Combining Equalities and Solvable Theories without Canonizers Sylvain Conchon, Evelyne Contejean and Johannes Kanig ProVal Project Universit´e Paris Sud / CNRS / INRIA

    Add to Reading List

    Source URL: www.lsi.upc.edu

    Language: English - Date: 2007-07-13 04:34:22
    3Cryptography / Steganography / Steganalysis / Bit numbering / Deep learning / Public-key cryptography / RSA / Generative adversarial network / Artificial neural network / Steganographic file system / BPCS-Steganography

    Generating steganographic images via adversarial training Jamie Hayes University College London

    Add to Reading List

    Source URL: papers.nips.cc

    Language: English - Date: 2018-02-13 04:01:42
    4Data management / Big data / Technology forecasting / Transaction processing / Citizen science / Data mining / Crowdsourcing / Computing / Data / Information

    THIS MANUSCRIPT IS A PRE-PRINT OF: Hill, B. M., Dailey, D., Guy, R. T., Lewis, B., Matsuzaki, M., & Morgan, J. TDemocratizing Data Science: The Community Data Science Workshops and Classes. In N. Jullien, S. A.

    Add to Reading List

    Source URL: mako.cc

    Language: English - Date: 2018-06-23 22:40:14
    5Denial-of-service attacks / Statistical inference / Cyberwarfare / Estimation theory / Computing / Denial-of-service attack / Internet Relay Chat / Domain name system / Anycast / Cross-validation / Regression analysis / Prediction

    Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning Shuang Wei† , Yijing Ding† , Tongxin Li† , Shuaifu Dai‡ , Xinfeng Wu† and Xinhui Han†∗ † Peking University ‡ CNCERT/CC

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-27 07:43:28
    6Cryptocurrencies / Ethereum / Blockchains / Concurrent computing / Distributed computing / Computing / Kin / Smart contract / Joseph Lubin / Draft:Enjin / UnikoinGold

    WHITE PAPER Supercar Smart Contracts www.cryptocars.cc Facebook: FB.com/cryptocarscc Twitter: @cryptocarscc

    Add to Reading List

    Source URL: cryptocars.cc

    Language: English - Date: 2018-03-15 22:00:58
    7

     1TICPKUCVKQPCNEJCTV CUCVƥ#RTKNƦƤƥƬ ĀþćþċúąĆþþčĂćĀĈÿČāúċþāĈąýþċČ

    Add to Reading List

    Source URL: www.snb.ch

    Language: Vietnamese
      8Computer hardware / Computer architecture / Computing / Side-channel attacks / Computer security / X86 architecture / Central processing unit / Computer memory / Spectre / Microarchitecture / CPU cache / Meltdown

      NetSpectre: Read Arbitrary Memory over Network Michael Schwarz Martin Schwarzl Graz University of Technology

      Add to Reading List

      Source URL: gruss.cc

      Language: English - Date: 2018-07-26 17:58:17
      9Computing / Internet privacy / Software / Technology / Internet censorship / Text messaging / Email / Internet censorship circumvention / Freenet / Deep packet inspection / Steganography / SMS

      Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu Abstract

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2010-06-03 17:05:03
      UPDATE