Computer Laboratory

Results: 4525



#Item
651Software / System software / Computer security / Computer viruses / Antivirus software / Deception / Internet security / Malware / Virus / Computer worm / Avira / Comparison of computer viruses

A Pact with the Devil Mike Bond and George Danezis Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, CB3 0FD, UK {Mike.Bond, George.Danezis}@cl.cam.ac.uk

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:54
652Neuroscience / Neuropsychology / Nervous system / Statistical classification / Computer vision / Image processing / Saliency map / Attention / Receiver operating characteristic / Metric / Binary classification / Amphetamine

A Data-driven Metric for Comprehensive Evaluation of Saliency Models Jia Li1,2∗ , Changqun Xia1 , Yafei Song1 , Shu Fang3 , Xiaowu Chen1∗ 1 State Key Laboratory of Virtual Reality Technology and Systems, School of Co

Add to Reading List

Source URL: www.cv-foundation.org

Language: English - Date: 2015-10-24 14:56:31
653

Towards High-Level Programming for Distributed Problem Solving∗ Ryan F. Kelly and Adrian R. Pearce NICTA Victoria Research Laboratory Department of Computer Science and Software Engineering The University of Melbourne

Add to Reading List

Source URL: www.rfk.id.au

Language: English - Date: 2015-05-24 18:36:22
    654

    D3N: Programming Distributed Computation in Pocket Switched Networks Eiko Yoneki, Ioannis Baltopoulos, and Jon Crowcroft University of Cambridge, Computer Laboratory Cambridge CB3 0FD, United Kingdom

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2009-07-22 15:02:24
      655

      Stressing Out: Bitcoin “Stress Testing” Khaled Baqer1 , Danny Yuxing Huang2 , Damon McCoy3 , and Nicholas Weaver4 1 Computer Laboratory, University of Cambridge 2

      Add to Reading List

      Source URL: fc16.ifca.ai

      Language: English - Date: 2016-01-27 10:23:36
        656

        Static Verification of Design Constraints and Software Correctness Properties in the Hob System Patrick Lam and Martin Rinard Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology

        Add to Reading List

        Source URL: patricklam.ca

        Language: English - Date: 2015-09-18 09:21:42
          657

          Robust Topology Formation using BTnodes Jan Beutel 1 Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zurich, Switzerland

          Add to Reading List

          Source URL: www.tik.ee.ethz.ch

          Language: English - Date: 2004-11-30 11:12:50
            658Network theory / Graph theory / Physics / Mathematics / Networks / Connectivity / Topology / Graphical models / Crowds / Degree of anonymity

            Mix-networks with Restricted Routes George Danezis University of Cambridge, Computer Laboratory, William Gates Building, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom.

            Add to Reading List

            Source URL: www0.cs.ucl.ac.uk

            Language: English - Date: 2013-10-10 06:48:54
            659Software / Computing / Computer programming / Compiling tools / Build automation / Message Passing Interface / Absoft Fortran Compilers / MPICH / Intel Fortran Compiler / Configure script / CFLAGS / Fortran

            MPICH Installer’s Guide∗ Version 3.2 Mathematics and Computer Science Division Argonne National Laboratory Abdelhalim Amer Pavan Balaji

            Add to Reading List

            Source URL: www.mpich.org

            Language: English - Date: 2015-11-11 23:18:53
            660

            Rewriting, Inference, and Proof? Appears in the Proceedings of the 8th Workshop on Rewriting Logic and its Applications, 2010 Natarajan Shankar1 Computer Science Laboratory

            Add to Reading List

            Source URL: www.csl.sri.com

            Language: English - Date: 2015-04-22 13:39:17
              UPDATE