Cis

Results: 5683



#Item
191

Microsoft PowerPoint - Seshia-ExCAPE-SummerSchool-Jun2015-Part2

Add to Reading List

Source URL: excape.cis.upenn.edu

Language: English - Date: 2015-06-24 18:08:35
    192

    International Conference on Automonic Computing Anatomy of a Real-time Intrusion Prevention System Ricardo Koller, Raju Rangaswami, Joseph Marrero, Igor Hernandez, Geoffrey Smith, Mandy Barsilai, Silviu Necula, S. Masou

    Add to Reading List

    Source URL: users.cis.fiu.edu

    Language: English - Date: 2008-10-29 13:00:35
      193Cryptography / Mathematics / Fingerprinting algorithms / Identification / Biometrics / Fingerprint / Human anatomy / Computer arithmetic / Public key fingerprint / Euclidean vector / Vector / Authentication

      Fingerprinting Blank Paper Using Commodity Scanners

      Add to Reading List

      Source URL: www.cis.upenn.edu

      Language: English - Date: 2017-08-26 11:23:54
      194

      DEDUCTION CALEB STANFORD 1. Natural Deduction Overview In what follows we present a system of natural deduction. For a set of formulas Σ and a formula ϕ, we will define what it means for Σ ` ϕ. (Note that we are usin

      Add to Reading List

      Source URL: cis.upenn.edu

      Language: English - Date: 2018-07-19 15:45:07
        195

        EBRD AND UNCITRAL INITIATIVE ON ENHANCING PUBLIC PROCUREMENT REGULATION IN THE CIS COUNTRIES AND MONGOLIA Action Plan

        Add to Reading List

        Source URL: www.ppi-ebrd-uncitral.com

        Language: English - Date: 2014-12-17 18:34:40
          196

          USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs Yang Su University of Adelaide Damith Ranasinghe University of Adelaide

          Add to Reading List

          Source URL: www.cis.upenn.edu

          Language: English - Date: 2017-08-28 17:01:11
            197

            COT 5420 | Homework 4 Due Monday, November 22 Read Se tions 2.2 and 2.3 of Sipser and solve the following problems: 1. Re all that a CFG is in

            Add to Reading List

            Source URL: users.cis.fiu.edu

            Language: English - Date: 2004-11-12 20:34:15
              198

              Nontermination and Secure Information Flow ∗ Geoffrey Smith and Rafael Alp´ızar School of Computing and Information Sciences Florida International University Miami, FLUSA October 24, 2011

              Add to Reading List

              Source URL: users.cis.fiu.edu

              Language: English - Date: 2011-10-24 15:43:42
                199

                2016 IEEE 29th Computer Security Foundations Symposium Correlated Secrets in Quantitative Information Flow Nicol´as E. Bordenabe Geoffrey Smith

                Add to Reading List

                Source URL: users.cis.fiu.edu

                Language: English - Date: 2017-08-28 12:01:04
                  200

                  SYNTHESIS OF DISTRIBUTED PROTOCOLS FROM SCENARIOS AND SPECIFICATIONS Abhishek Udupa A DISSERTATION in Computer and Information Science

                  Add to Reading List

                  Source URL: www.cis.upenn.edu

                  Language: English - Date: 2016-02-09 11:55:55
                    UPDATE