Computer Laboratory

Results: 4525



#Item
851

A birthday present every eleven wallets? The security of customer-chosen banking PINs Joseph Bonneau, S¨oren Preibusch, Ross Anderson Computer Laboratory University of Cambridge {jcb82,sdp36,rja14}@cl.cam.ac.uk

Add to Reading List

Source URL: fc12.ifca.ai

Language: English - Date: 2012-02-18 14:34:19
    852

    A fast APRIORI implementation Ferenc Bodon∗ Informatics Laboratory, Computer and Automation Research Institute, Hungarian Academy of Sciences H-1111 Budapest, L´agym´anyosi u. 11, Hungary

    Add to Reading List

    Source URL: sunsite.informatik.rwth-aachen.de

    Language: English - Date: 2003-11-22 10:12:04
      853

      Causal Discovery in Social Media Using Quasi-Experimental Designs Hüseyin Oktay, Brian J. Taylor, David D. Jensen Knowledge Discovery Laboratory Department of Computer Science University of Massachusetts Amherst

      Add to Reading List

      Source URL: snap.stanford.edu

      Language: English - Date: 2010-07-07 22:21:56
        854

        Mixed-Criticality Runtime Mechanisms and Evaluation on Multicores Lukas Sigrist, Georgia Giannopoulou, Pengcheng Huang, Andres Gomez, Lothar Thiele Computer Engineering and Networks Laboratory, ETH Zurich, 8092 Zurich, S

        Add to Reading List

        Source URL: www.tik.ethz.ch

        Language: English - Date: 2015-02-26 09:02:08
          855

          Immutable Distributed Infrastructure for Unikernels WG2.8, Greece Anil Madhavapeddy (speaker) with Benjamin Farinier and Thomas Gazagnaire University of Cambridge Computer Laboratory

          Add to Reading List

          Source URL: www.cs.ox.ac.uk

          Language: English - Date: 2015-07-21 03:22:19
            856

            Internet Multi-Homing Problems: Explanations from Economics Richard Clayton Computer Laboratory, University of Cambridge JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom

            Add to Reading List

            Source URL: weis09.infosecon.net

            Language: English - Date: 2013-09-01 23:23:37
              857

              The Privacy Jungle: On the Market for Data Protection in Social Networks Joseph Bonneau Computer Laboratory University of Cambridge

              Add to Reading List

              Source URL: weis09.infosecon.net

              Language: English - Date: 2013-09-01 23:23:37
                858

                Feature-based Pronunciation Modeling with Trainable Asynchrony Probabilities Karen Livescu and James Glass MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA 02139, USA klivescu,glass @csail.mit.ed

                Add to Reading List

                Source URL: ttic.uchicago.edu

                Language: English - Date: 2008-02-21 07:48:13
                  859Game theory / Computing / File sharing / Intellectual property law / Peer-to-peer / Social peer-to-peer processes / Price of stability / Price of anarchy / Scalability / Technology / Politics

                  On the Topologies Formed by Selfish Peers Thomas Moscibroda, Stefan Schmid, Roger Wattenhofer {moscitho, schmiste, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory, ETH Zurich, Switzerland ABSTRAC

                  Add to Reading List

                  Source URL: iptps06.cs.ucsb.edu

                  Language: English - Date: 2006-02-15 01:41:08
                  860Scheduling algorithms / Nuclear technology / Nuclear physics / Radioactivity / Planning / Scheduling / Criticality

                  Service Adaptions for Mixed-Criticality Systems TIK Report No. 350 Pengcheng Huang, Georgia Giannopoulou, Nikolay Stoimenov, Lothar Thiele Computer Engineering and Networks Laboratory, ETH Zurich firstname.lastname@tik.e

                  Add to Reading List

                  Source URL: www.tik.ethz.ch

                  Language: English - Date: 2014-10-27 20:04:04
                  UPDATE