Challenges

Results: 28633



#Item
31Mathematics / Mathematical analysis / Geometry / Functional analysis / Metric geometry / Banach spaces / General topology / BanachMazur compactum / Tsirelson space / Normed vector space / Metric space / Compact operator

METRIC DIMENSION REDUCTION: A SNAPSHOT OF THE RIBE PROGRAM ASSAF NAOR 1. Introduction The purpose of this article is to survey some of the context, achievements, challenges and mysteries of the field of metric dimension

Add to Reading List

Source URL: eta.impa.br

Language: English - Date: 2018-07-28 17:09:47
32Cryptocurrencies / Blockchains / Ethereum / Computing / Concurrent computing / Distributed computing / Bitcoin / Alternative currencies / Joseph Lubin / Cardano / Draft:Ambisafe Software / Monax

Matthew Spoke is the founder of Aion, a world-leading blockchain protocol designed to solve the most prevalent challenges limiting blockchains mainstream adoption: scalability, interoperability and governance. Matt serve

Add to Reading List

Source URL: aion.network

Language: English - Date: 2018-09-24 13:44:10
33Finance / Money / Economy / European Union directives / Alternative Investment Fund Managers Directive / Corporate law / European Union / Funds / Investment management / Agius / Hedge fund / Malta

AIFMD implementation experiences, challenges and opportunities AIFMD implementation – experiences, challenges and opportunities 8 MayCorinthia Hotel London

Add to Reading List

Source URL: mfia.org.mt

Language: English - Date: 2015-04-10 14:28:15
34Formal methods / Logic in computer science / Systems engineering / Software engineering / Electronic engineering / Theoretical computer science / Electrical engineering / Electronic design / Formal verification / Runtime verification / Verification / Integrated circuit design

Panel on Research Challenges for Agent Verification ==================================================== The first speaker was Dr. Kerstin Eder from the University of Bristol and Bristol Robotics Lab.  She began by high

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2015-11-05 09:33:36
35Theoretical computer science / Logic in computer science / NP-complete problems / Constraint programming / Electronic design automation / Satisfiability modulo theories / Universal quantification / Solver

Challenges for Fast Synthesis Procedures in SMT Andrew Reynolds ARCADE Workshop August 6, 2017

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2017-08-08 03:28:39
36Algebra / Mathematics / Polynomials / Computer algebra / Integer factorization algorithms / Finite fields / Special number field sieve / General number field sieve / Irreducible polynomial / Discrete logarithm / Factorization / Resultant

Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography Alfred Menezes1 , Palash Sarkar2 , and Shashank Singh3 1 Department of Combinatorics & Optimization, University of Water

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-12-27 11:29:50
37Government of New York City / Borough president / Community boards of New York City / National Telecommunications and Information Administration / Participatory budgeting / Business process management / Economy / Government / United States

OctoberData Design Challenges and Opportunities for NYC BetaNYC Community Boards

Add to Reading List

Source URL: beta.nyc

Language: English - Date: 2018-10-11 12:04:22
38Human behavior / Psychology / Behavior / Cognition / Exercise equipment / Pedometer / Walking / Social networking service / Physical attractiveness / Sport / Motivation / Text messaging

How Gamification Affects Physical Activity: Large-scale Analysis of Walking Challenges in a Mobile Application Ali Shameli Tim Althoff

Add to Reading List

Source URL: www.timalthoff.com

Language: English - Date: 2017-02-23 21:29:35
39Cryptography / Public-key cryptography / Key management / Transport Layer Security / Internet Standards / Public key infrastructure / Domain Name System Security Extensions / Public key certificate / Certificate authority / X.509 / DNS root zone / Man-in-the-middle attack

XXXX Authentication Challenges in a Global Environment Stephanos Matsumoto, Carnegie Mellon University/ETH Zurich Raphael M. Reischuk, ETH Zurich Pawel Szalachowski, ETH Zurich Tiffany Hyun-Jin Kim, HRL Laboratories

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
UPDATE