Control Yuan

Results: 47



#Item
31International development / Centre for Economic Policy Research / Richard Portes / Barry Eichengreen / Capital account / Capital control / Financial crisis / International Monetary Fund / Avinash Persaud / Economics / International economics / International trade

• Develop alternatives to US Treasuries as the dominant reserve asset, including the issuance of mutually guaranteed European bonds and (in the more distant future) the development of a yuan bond market.

Add to Reading List

Source URL: voxeu.org

Language: English - Date: 2014-11-23 05:53:44
32Software / Photo sharing / Social information processing / Image hosting / Information retrieval / Flickr / Tag / Picasa / Internet privacy / World Wide Web / Computing / Web 2.0

Tag, You Can See It! Using Tags for Access Control in Photo Sharing Peter F. Klemperer? , Yuan Liang? , Michelle L. Mazurek? , Manya Sleeper? , Blase Ur? Lujo Bauer? , Lorrie Faith Cranor? , Nitin Gupta? , Michael K. Rei

Add to Reading List

Source URL: www.blaseur.com

Language: English - Date: 2012-05-16 13:06:26
33Network performance / Internet / TCP/IP / Internet protocols / Internet standards / Network congestion / FAST TCP / Transmission Control Protocol / Fairness measure / Network architecture / Routing algorithms / Computing

A Generalized FAST TCP Scheme Cao Yuan a , Liansheng Tan a,b , Lachlan L. H. Andrew c , Wei Zhang a , Moshe Zukerman d,∗ , a Department b The

Add to Reading List

Source URL: leecenter.caltech.edu

Language: English - Date: 2009-05-08 15:47:20
34Internet privacy / ITunes / Computer file / Google / Authorization / Software / Media technology / Computing

Access Control for Home Data Sharing: Attitudes, Needs and Practices Michelle L. Mazurek, J.P. Arsenault, Joanna Bresee, Nitin Gupta, Iulia Ion† , Christina Johns, Daniel Lee, Yuan Liang, Jenny Olsen, Brandon Salmon, R

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:14
35Software / Photo sharing / Social information processing / Image hosting / Information retrieval / Flickr / Tag / Picasa / Internet privacy / World Wide Web / Computing / Web 2.0

Tag, You Can See It! Using Tags for Access Control in Photo Sharing Peter F. Klemperer? , Yuan Liang? , Michelle L. Mazurek? , Manya Sleeper? , Blase Ur? Lujo Bauer? , Lorrie Faith Cranor? , Nitin Gupta? , Michael K. Rei

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:17
36Access control / Computer security / Identity management / File system / Authorization / Tar / Trusted Computing / Internet privacy / Tag / Computing / System software / Information

Toward strong, usable access control for shared distributed data Michelle L. Mazurek, Yuan Liang, William Melicher, Manya Sleeper, Lujo Bauer, Gregory R. Ganger, Nitin Gupta, and Michael K. Reiter* Carnegie Mellon Univer

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2014-01-23 21:09:28
37Classical cipher / Jan Willem Klop / Computer programming / Computing / Software engineering

SUBMERGED VANES FOR FLOW CONTROL AND BANK PROTECTION IN STREAMS A. Jacob Odgaard and I-Tong-Yuan E. Lee submitted to

Add to Reading List

Source URL: www.iowadot.gov

Language: English - Date: 2014-04-16 17:19:56
38

Discovering Access-Control Misconfigurations: New Approaches and Evaluation Methodologies Lujo Bauer Yuan Liang

Add to Reading List

Source URL: www.ece.cmu.edu

Language: English - Date: 2012-06-20 08:58:17
    39Internet protocols / Network performance / Transmission Control Protocol / Network congestion / Packet loss / Transport layer / Hypertext Transfer Protocol / Traffic generation model / Real Time Messaging Protocol / Computing / Network architecture / Teletraffic

    Stochastic Models for Generating Synthetic HTTP Source Traffic Jin Cao, William S. Cleveland, Yuan Gao, Kevin Jeffay, F. Donelson Smith, Michele Weigle Abstract— New source-level models for aggregated HTTP traffic and

    Add to Reading List

    Source URL: www.stat.purdue.edu

    Language: English - Date: 2004-02-20 20:12:38
    40Computer networking / Routing / Network coding / Packet Processing / Communications protocol / Transmission Control Protocol / Transport layer / Router / Computing / Data / Information

    Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Zimu Liu1 , Yuan Feng2 , and Baochun Li1 1 Department of Electrical and Computer Engineering, University of Toronto

    Add to Reading List

    Source URL: www.savinetwork.ca

    Language: English - Date: 2013-10-03 15:37:30
    UPDATE