CC

Results: 30042



#Item
1Software-basierte Mikroarchitekturangriffe1 Daniel Gruss2 Abstract: Moderne Prozessoren sind hoch optimierte Systeme, bei denen jeder einzelne Rechenzeitzyklus von Bedeutung ist. Viele Optimierungen h¨angen von den Date

Software-basierte Mikroarchitekturangriffe1 Daniel Gruss2 Abstract: Moderne Prozessoren sind hoch optimierte Systeme, bei denen jeder einzelne Rechenzeitzyklus von Bedeutung ist. Viele Optimierungen h¨angen von den Date

Add to Reading List

Source URL: gruss.cc

Language: German - Date: 2018-09-28 10:46:40
    2CC(X): Efficiently Combining Equalities and Solvable Theories without Canonizers Sylvain Conchon, Evelyne Contejean and Johannes Kanig ProVal Project Universit´e Paris Sud / CNRS / INRIA

    CC(X): Efficiently Combining Equalities and Solvable Theories without Canonizers Sylvain Conchon, Evelyne Contejean and Johannes Kanig ProVal Project Universit´e Paris Sud / CNRS / INRIA

    Add to Reading List

    Source URL: www.lsi.upc.edu

    Language: English - Date: 2007-07-13 04:34:22
    3Generating steganographic images via adversarial training Jamie Hayes University College London

    Generating steganographic images via adversarial training Jamie Hayes University College London

    Add to Reading List

    Source URL: papers.nips.cc

    Language: English - Date: 2018-02-13 04:01:42
    4THIS MANUSCRIPT IS A PRE-PRINT OF: Hill, B. M., Dailey, D., Guy, R. T., Lewis, B., Matsuzaki, M., & Morgan, J. TDemocratizing Data Science: The Community Data Science Workshops and Classes. In N. Jullien, S. A.

    THIS MANUSCRIPT IS A PRE-PRINT OF: Hill, B. M., Dailey, D., Guy, R. T., Lewis, B., Matsuzaki, M., & Morgan, J. TDemocratizing Data Science: The Community Data Science Workshops and Classes. In N. Jullien, S. A.

    Add to Reading List

    Source URL: mako.cc

    Language: English - Date: 2018-06-23 22:40:14
    5Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning Shuang Wei† , Yijing Ding† , Tongxin Li† , Shuaifu Dai‡ , Xinfeng Wu† and Xinhui Han†∗ † Peking  University ‡ CNCERT/CC

    Poster: A DDoS Peak Traffic Volume Prediction Method Based on Machine Learning Shuang Wei† , Yijing Ding† , Tongxin Li† , Shuaifu Dai‡ , Xinfeng Wu† and Xinhui Han†∗ † Peking University ‡ CNCERT/CC

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-27 07:43:28
    6WHITE PAPER Supercar Smart Contracts www.cryptocars.cc Facebook: FB.com/cryptocarscc Twitter: @cryptocarscc

    WHITE PAPER Supercar Smart Contracts www.cryptocars.cc Facebook: FB.com/cryptocarscc Twitter: @cryptocarscc

    Add to Reading List

    Source URL: cryptocars.cc

    Language: English - Date: 2018-03-15 22:00:58
    7 1TICPKUCVKQPCNEJCTV CUCVƥ#RTKNƦƤƥƬ ĀþćþċúąĆþþčĂćĀĈÿČāúċþāĈąýþċČ

     1TICPKUCVKQPCNEJCTV CUCVƥ#RTKNƦƤƥƬ ĀþćþċúąĆþþčĂćĀĈÿČāúċþāĈąýþċČ

    Add to Reading List

    Source URL: www.snb.ch

    Language: Vietnamese
      8NetSpectre: Read Arbitrary Memory over Network Michael Schwarz Martin Schwarzl  Graz University of Technology

      NetSpectre: Read Arbitrary Memory over Network Michael Schwarz Martin Schwarzl Graz University of Technology

      Add to Reading List

      Source URL: gruss.cc

      Language: English - Date: 2018-07-26 17:58:17
      9Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu  Abstract

      Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu Abstract

      Add to Reading List

      Source URL: www.usenix.org

      Language: English - Date: 2010-06-03 17:05:03