Code

Results: 200833



#Item
51

[Vos prénom et nom] [rue et numéro] [code postal et ville] Recommandé

Add to Reading List

Source URL: www.frc.ch

Language: French - Date: 2018-09-03 08:06:45
    52Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

    Invest in future. Invest in your side of the firewall We provide individualized service based on peculiarities of your code and cybersecurity perimeter and offer wide customization options for each bug bounty program tha

    Add to Reading List

    Source URL: hacken.io

    Language: English - Date: 2017-10-12 11:58:32
    53Understanding Regression Failures through Test-Passing and Test-Failing Code Changes Roykrong Sukkerd , Ivan Beschastnikh , Jochen Wuttke , Sai Zhang , Yuriy Brun University of Washington University of Massachusetts Seat

    Understanding Regression Failures through Test-Passing and Test-Failing Code Changes Roykrong Sukkerd , Ivan Beschastnikh , Jochen Wuttke , Sai Zhang , Yuriy Brun University of Washington University of Massachusetts Seat

    Add to Reading List

    Source URL: zhang-sai.github.io

    Language: English - Date: 2015-05-05 00:58:34
    54WyoHackathon  Code of Conduct Purpose WyoHackathon stands for inclusivity. We believe that every single person has the right to build products in a safe and welcoming environment. This Code of Conduct outlines our expect

    WyoHackathon Code of Conduct Purpose WyoHackathon stands for inclusivity. We believe that every single person has the right to build products in a safe and welcoming environment. This Code of Conduct outlines our expect

    Add to Reading List

    Source URL: cdn.landinglion.net

    Language: English - Date: 2018-08-29 19:50:19
    55Software engineering / Computer programming / Computing / Method / Data types / Object-oriented programming languages / Programming languages / Subroutines / Late binding / Objective-C / Extension method / C Sharp 4.0

    New features in C# 4.0 Mads Torgersen, C# Language PM Contents 11

    Add to Reading List

    Source URL: code.msdn.microsoft.com

    Language: English
    56Towards Self-Verification in Finite Difference Code Generation Jan H¨ uckelheim1 , Ziqing Luo2 , Fabio Luporini1 ,Navjot Kukreja1 , Michael Lange1 , Gerard Gorman1 , Stephen Siegel2 , Matthew Dwyer3 , Paul Hovland4

    Towards Self-Verification in Finite Difference Code Generation Jan H¨ uckelheim1 , Ziqing Luo2 , Fabio Luporini1 ,Navjot Kukreja1 , Michael Lange1 , Gerard Gorman1 , Stephen Siegel2 , Matthew Dwyer3 , Paul Hovland4

    Add to Reading List

    Source URL: correctness-workshop.github.io

    Language: English - Date: 2017-11-14 22:52:13
    57Drive-By Key-Extraction Cache Attacks from Portable Code

    Drive-By Key-Extraction Cache Attacks from Portable Code

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2018-08-09 16:13:08
    58Inferring Crypto API Rules from Code Changes Rumen Paletov∗ Petar Tsankov  ETH Zurich, Switzerland

    Inferring Crypto API Rules from Code Changes Rumen Paletov∗ Petar Tsankov ETH Zurich, Switzerland

    Add to Reading List

    Source URL: files.sri.inf.ethz.ch

    Language: English - Date: 2018-09-05 10:55:59
      59Free​ ​Geek​ ​Code​ ​of​ ​Conduct  We​ ​strive​ ​to​ ​make​ ​Free​ ​Geek​ ​a​ ​welcoming,​ ​safe​ ​and​ ​comfortable​ ​space for​ ​everyone​​ ​(volunt

      Free​ ​Geek​ ​Code​ ​of​ ​Conduct We​ ​strive​ ​to​ ​make​ ​Free​ ​Geek​ ​a​ ​welcoming,​ ​safe​ ​and​ ​comfortable​ ​space for​ ​everyone​​ ​(volunt

      Add to Reading List

      Source URL: www.freegeek.org

      Language: English - Date: 2017-09-28 13:44:30
      60

      [Vos prénom et nom] [rue et numéro] [code postal et ville] Recommandé

      Add to Reading List

      Source URL: www.frc.ch

      Language: French - Date: 2018-09-03 08:07:10