Computer

Results: 301026



#Item
11Rule Formats for Nominal Operational Semantics A very short and informal introduction Luca Aceto Gran Sasso Science Institute, L’Aquila, and ICE-TCS, School of Computer Science, Reykjavik University

Rule Formats for Nominal Operational Semantics A very short and informal introduction Luca Aceto Gran Sasso Science Institute, L’Aquila, and ICE-TCS, School of Computer Science, Reykjavik University

Add to Reading List

Source URL: tlt2017.di.unito.it

Language: English - Date: 2017-10-04 12:33:27
12Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer  Science and Engineering, University of California, San Di

Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer Science and Engineering, University of California, San Di

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
    13Programming with “Big Code”: Lessons, Techniques and Applications Pavol Bielik1 , Veselin Raychev1 , and Martin Vechev1 1  Department of Computer Science, ETH Zurich, Switzerland

    Programming with “Big Code”: Lessons, Techniques and Applications Pavol Bielik1 , Veselin Raychev1 , and Martin Vechev1 1 Department of Computer Science, ETH Zurich, Switzerland

    Add to Reading List

    Source URL: files.sri.inf.ethz.ch

    Language: English - Date: 2018-09-05 10:56:02
    14EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

    EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2016-11-21 18:50:20
    15Improving Local Search with Open Geographic Data Chuankai An, Dan Rockmore Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA {chuankai, rockmore}@cs.dartmouth.edu  ABSTRACT

    Improving Local Search with Open Geographic Data Chuankai An, Dan Rockmore Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA {chuankai, rockmore}@cs.dartmouth.edu ABSTRACT

    Add to Reading List

    Source URL: gdac.uqam.ca

    Language: English - Date: 2017-10-04 00:47:38
    16die datenschleuder . das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Y2HACK – Hacking in Israel EXPO 2000 “Spezial”

    die datenschleuder . das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Y2HACK – Hacking in Israel EXPO 2000 “Spezial”

    Add to Reading List

    Source URL: ds.ccc.de

    Language: German - Date: 2006-03-14 18:33:04
      17Steps to introduce VIPSTARCOIN wallets  1. Download a wallet program from the official website that is appropriate to your computer.  2. Unarchive the compressed file and run ‘VIPSTARCOIN-qt.exe’ in the folder.

      Steps to introduce VIPSTARCOIN wallets 1. Download a wallet program from the official website that is appropriate to your computer. 2. Unarchive the compressed file and run ‘VIPSTARCOIN-qt.exe’ in the folder.

      Add to Reading List

      Source URL: www.vipstarcoin.jp

      Language: English - Date: 2018-07-15 11:02:08
      18SCAN 2018 Post-conference Proceedings Special Issue of Journal of Computational and Applied Mathematics Call for Papers Special Issue on the 18th International Symposium on Scientific Computing, Computer Arithmetic,

      SCAN 2018 Post-conference Proceedings Special Issue of Journal of Computational and Applied Mathematics Call for Papers Special Issue on the 18th International Symposium on Scientific Computing, Computer Arithmetic,

      Add to Reading List

      Source URL: scan2018.oishi.info.waseda.ac.jp

      Language: English - Date: 2018-09-08 22:45:08
      19Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

      Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:58:45
        20A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

        A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

        Add to Reading List

        Source URL: www.neven.org

        Language: English - Date: 2012-04-18 06:07:38