Code

Results: 200833



#Item
51

[Vos prénom et nom] [rue et numéro] [code postal et ville] Recommandé

Add to Reading List

Source URL: www.frc.ch

Language: French - Date: 2018-09-03 08:06:45
    52Security engineering / Cyberwarfare / Computer network security / Cybercrime / Computer security / Cryptography / Secure communication / HKN / Security

    Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

    Add to Reading List

    Source URL: hacken.io

    Language: English - Date: 2017-10-12 11:58:32
    53Abstract algebra / Estimation theory / Extreme programming / Software testing / Mathematics / Debugging / Delta debugging / Regression analysis / Regression testing / Localization

    Understanding Regression Failures through Test-Passing and Test-Failing Code Changes Roykrong Sukkerd , Ivan Beschastnikh , Jochen Wuttke , Sai Zhang , Yuriy Brun University of Washington University of Massachusetts Seat

    Add to Reading List

    Source URL: zhang-sai.github.io

    Language: English - Date: 2015-05-05 00:58:34
    54Human behavior / Abuse / Crimes / Bullying / Behavior / Harassment / Stalking / Intimidation

    WyoHackathon Code of Conduct Purpose WyoHackathon stands for inclusivity. We believe that every single person has the right to build products in a safe and welcoming environment. This Code of Conduct outlines our expect

    Add to Reading List

    Source URL: cdn.landinglion.net

    Language: English - Date: 2018-08-29 19:50:19
    55Software engineering / Computer programming / Computing / Method / Data types / Object-oriented programming languages / Programming languages / Subroutines / Late binding / Objective-C / Extension method / C Sharp 4.0

    New features in C# 4.0 Mads Torgersen, C# Language PM Contents 11

    Add to Reading List

    Source URL: code.msdn.microsoft.com

    Language: English
    56Computing / Computer programming / Software engineering / Operator theory / Fortran / OpenMP / Parallel computing / Hermitian adjoint / Adjoint

    Towards Self-Verification in Finite Difference Code Generation Jan H¨ uckelheim1 , Ziqing Luo2 , Fabio Luporini1 ,Navjot Kukreja1 , Michael Lange1 , Gerard Gorman1 , Stephen Siegel2 , Matthew Dwyer3 , Paul Hovland4

    Add to Reading List

    Source URL: correctness-workshop.github.io

    Language: English - Date: 2017-11-14 22:52:13
    57Computing / Computer architecture / Computer hardware / Computer memory / Central processing unit / Web programming / X86 architecture / Google Native Client / CPU cache / Spectre / JavaScript / Cache

    Drive-By Key-Extraction Cache Attacks from Portable Code

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2018-08-09 16:13:08
    58

    Inferring Crypto API Rules from Code Changes Rumen Paletov∗ Petar Tsankov ETH Zurich, Switzerland

    Add to Reading List

    Source URL: files.sri.inf.ethz.ch

    Language: English - Date: 2018-09-05 10:55:59
      59Abuse / Bullying / Harassment

      Free​ ​Geek​ ​Code​ ​of​ ​Conduct We​ ​strive​ ​to​ ​make​ ​Free​ ​Geek​ ​a​ ​welcoming,​ ​safe​ ​and​ ​comfortable​ ​space for​ ​everyone​​ ​(volunt

      Add to Reading List

      Source URL: www.freegeek.org

      Language: English - Date: 2017-09-28 13:44:30
      60

      [Vos prénom et nom] [rue et numéro] [code postal et ville] Recommandé

      Add to Reading List

      Source URL: www.frc.ch

      Language: French - Date: 2018-09-03 08:07:10
        UPDATE