CECS

Results: 762



#Item
181Constraint programming / Scope / Name resolution / Constraint satisfaction / ALGOL 68 / Declaration / Constraint graph

A Constraint Language for Static Semantic Analysis Based on Scope Graphs Hendrik van Antwerpen Pierre Néron

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2015-12-19 13:32:20
182

Traffic Analysis of UDP-based Flows in Ourmon Portland State University - Computer Science Technical ReportJames R. Binkley Computer Science Dept. Portland State University Portland, OR, USA

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-01-02 16:23:46
    183

    On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions J. Black ∗ M. Cochran ∗

    Add to Reading List

    Source URL: web.cecs.pdx.edu

    Language: English - Date: 2009-09-29 10:07:47
      184

      An Algorithm for Anomaly-based Botnet Detection James R. Binkley Computer Science Dept. Portland State University Portland, OR, USA

      Add to Reading List

      Source URL: web.cecs.pdx.edu

      Language: English - Date: 2006-08-17 12:52:39
        185

        ContolSystemsDynamics_Sept24_Seminar

        Add to Reading List

        Source URL: cecs.uci.edu

        Language: English - Date: 2015-09-25 13:31:02
          186

          Down for the Count? Getting Reference Counting Back in the Ring ∗ Rifat Shahriyar Stephen M. Blackburn

          Add to Reading List

          Source URL: users.cecs.anu.edu.au

          Language: English - Date: 2012-04-22 19:29:17
            187

            IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 34, NO. 6, JUNEMulti-Target Tracking with Time-Varying Clutter Rate and Detection Profile: Application to

            Add to Reading List

            Source URL: users.cecs.anu.edu.au

            Language: English - Date: 2015-05-24 22:21:09
              188

              IEEE TRANSACTIONS ON MOBILE COMPUTING 1 Verifying Delivered QoS in Multi-hop Wireless Networks

              Add to Reading List

              Source URL: web.cecs.pdx.edu

              Language: English - Date: 2009-09-29 10:18:32
                189

                A preliminary version of this paper appeared in: T. Ristenpart, H. Shacham, and T. Shrimpton. Careful with Composition: Limitations of the Indifferentiability Framework. Advances in Cryptology – EUROCRYPT ’11, LNCS v

                Add to Reading List

                Source URL: web.cecs.pdx.edu

                Language: English - Date: 2011-06-27 19:07:47
                  190

                  Threshold Password-Authenticated Key Exchange Philip MacKenzie∗ Bell Laboratories Lucent Technologies Murray Hill, NJUSA

                  Add to Reading List

                  Source URL: web.cecs.pdx.edu

                  Language: English - Date: 2009-09-29 10:16:44
                    UPDATE