Computer Laboratory

Results: 4525



#Item
901

So You Want to Take Over a Botnet... David Dittrich Applied Physics Laboratory University of Washington Abstract Computer criminals regularly construct large distributed attack networks comprised of many thousands

Add to Reading List

Source URL: staff.washington.edu

Language: English - Date: 2012-03-27 18:48:52
    902

    3D-NCuts: Adapting Normalized Cuts to 3D Triangulated Surface Segmentation Zahra Toony1 , Denis Laurendeau1 , Philippe Giguère2 and Christian Gagné1 1 Computer Vision and System Laboratory, Department of Electrical an

    Add to Reading List

    Source URL: vision.gel.ulaval.ca

    Language: English - Date: 2014-03-21 18:38:02
      903

      Dependable Software Needs Pervasive Debugging Timothy L. Harris University of Cambridge Computer Laboratory J J Thomson Avenue, Cambridge, UK

      Add to Reading List

      Source URL: timharris.uk

      Language: English - Date: 2014-08-25 06:24:52
        904Computing / Internet / Network architecture / Internet protocols / Secure communication / Dark web / Internet security / Tor / Onion routing / Traffic analysis / Proxy server / Transmission Control Protocol

        Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

        Add to Reading List

        Source URL: www0.cs.ucl.ac.uk

        Language: English - Date: 2013-10-10 06:49:00
        905

        ECE 3400 Guest Lecture Design Principles and Methodologies in Computer Architecture Christopher Batten Computer Systems Laboratory School of Electrical and Computer Engineering

        Add to Reading List

        Source URL: www.csl.cornell.edu

        Language: English - Date: 2016-02-18 10:36:54
          906

          `C and tcc: A Language and Compiler for Dynamic Code Generation Massimiliano Poletto Laboratory for Computer Science, Massachusetts Institute of Technology and Wilson C. Hsieh

          Add to Reading List

          Source URL: www.stanford.edu

          Language: English
            907Computing / Internet / Dark web / Computer architecture / Distributed computing architecture / Network architecture / PlanetLab / Software testing / Tor / Overlay network

            Shadow: Running Tor in a Box for Accurate and Efficient Experimentation Rob Jansen∗ U.S. Naval Research Laboratory Abstract

            Add to Reading List

            Source URL: www-users.cs.umn.edu

            Language: English - Date: 2011-11-30 11:55:12
            908

            Location Based Placement of Whole Distributed Systems David Spence Jon Crowcroft University of Cambridge Computer Laboratory

            Add to Reading List

            Source URL: timharris.uk

            Language: English - Date: 2014-08-25 06:24:52
              909

              Probabilistic and Logical Beliefs J.W. Lloyd1 and K.S. Ng2 1 Computer Sciences Laboratory College of Engineering and Computer Science

              Add to Reading List

              Source URL: users.cecs.anu.edu.au

              Language: English - Date: 2008-01-31 02:29:00
                UPDATE