Computer

Results: 301026



#Item
131Technology / Computing / World Wide Web / Social media / Internet vigilantism / Internet-based activism / Cyberspace / Internet culture / Online shaming / Twitter / Tweet / Hashtag

Look Before You Shame: A Study on Shaming Activities on Twitter Rajesh Basak, Niloy Ganguly, Shamik Sural, Soumya K Ghosh Department of Computer Science & Engineering, Indian Institute of Technology Kharagpur Kharagpur,

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:23:08
132Search algorithms / Game artificial intelligence / Combinatorial optimization / Mathematics / Information science / Information retrieval / Artificial intelligence / Routing algorithms / Automated planning and scheduling / A* search algorithm / Heuristic / Incremental heuristic search

Planning with Concurrent Execution Bence Cserna Department of Computer Science University of New Hampshire Durham, NHUSA

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-09 08:09:24
133

die datenschleuder. das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Byebyecicle.

Add to Reading List

Source URL: ds.ccc.de

Language: German - Date: 2006-03-09 18:28:21
    134Interpersonal relationships / Interpersonal ties / Email / Barry Wellman / Mail / Text messaging / Au / Human behavior / Computing / Sociology

    The Social Effects of Keitai and Personal Computer E-mail in Japan1 Kakuko Miyata, Jeffrey Boase, and Barry Wellman Draft March 28, 2006

    Add to Reading List

    Source URL: individual.utoronto.ca

    Language: English - Date: 2017-09-21 13:37:57
    135

    Die Datenschleuder Das wissenschaftliche Fachblatt für Datenreisende Ein Organ des Chaos Computer Club Nahrung für die Desinformationsgesellschaft

    Add to Reading List

    Source URL: ds.ccc.de

    Language: German - Date: 2006-03-14 18:32:57
      136Cryptocurrencies / Bitcoin / Computing / Alternative currencies / Emerging technologies / Decentralization / Economy / Money / Blockchain / Bloom filter / Graphene / Potential applications of graphene

      Graphene: A New Protocol for Block Propagation Using Set Reconciliation A. Pinar Ozisik† , Gavin Andresen, George Bissias† , Amir Houmansadr† , Brian Levine† †College of Information and Computer Sciences, Univ.

      Add to Reading List

      Source URL: people.cs.umass.edu

      Language: English - Date: 2017-09-14 05:26:43
      137Concurrency control / Computing / Edsger W. Dijkstra / Concurrent computing / Computer programming / Concurrency / Transaction processing / Synchronization / Lock / Monitor / Parallel computing / Granularity

      An Algorithmic Framework for Synthesis of Concurrent Programs E. Allen Emerson and Roopsha Samanta Dept. of Computer Science and Computer Engineering Research Centre, University of Texas, Austin, TX 78712, USA. {emerson,

      Add to Reading List

      Source URL: www.cs.purdue.edu

      Language: English - Date: 2016-07-15 23:00:36
      138Cryptography / Mathematics / Polynomials / Multivariate cryptography / Algebra / Pseudorandom number generator / Computer algebra / Hidden Field Equations / QUAD / Field extension / Cryptographically secure pseudorandom number generator / Mersenne Twister

      Secure PRNGs from Specialized Polynomial Maps over Any Fq Feng-Hao Liu1 , Chi-Jen Lu2 , and Bo-Yin Yang2 1 Department of Computer Science, Brown University, Providence RI, USA

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2012-03-10 01:26:44
      139Cryptocurrencies / Alternative currencies / Economy / Money / Bitcoin / Blockchains / Computing / Decentralization / Ethereum / Digital currency / Proof-of-stake / Draft:Nihilo Blockchain Introduction

      Sentinel Protocol Security Intelligence Platform for Blockchain Abstract The rapid development of computer technology in the 21st century has led to the manifestation of sophisticated and intelligent threats that

      Add to Reading List

      Source URL: s3-ap-southeast-1.amazonaws.com

      Language: English - Date: 2018-10-12 03:26:38
      140Computer architecture / System software / Operating system kernels / Linux kernel / Monolithic kernels / Kernel / Loadable kernel module / Protection ring / Operating system / Mach / Rootkit / Mandatory access control

      Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-14 06:12:20
      UPDATE