Daniel

Results: 24996



#Item
61Cryptography / Public-key cryptography / Elliptic curve cryptography / Key management / Digital Signature Standard / Digital signature / Key / Post-quantum cryptography / EdDSA / RSA / Model theory / Digital Signature Algorithm

Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation? David Derler1 , Sebastian Ramacher1 , and Daniel Slamanig2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-08-28 04:23:05
62

Benchmarking 6DOF Outdoor Visual Localization in Changing Conditions Torsten Sattler1 Will Maddern2 Carl Toft3 Akihiko Torii4 Lars Hammarstrand3 Erik Stenborg3 Daniel Safari4,5 Masatoshi Okutomi4 Marc Pollefeys1,6 Josef

Add to Reading List

Source URL: openaccess.thecvf.com

Language: English - Date: 2018-06-11 13:34:10
    63Computer programming / Software engineering / Computing / Functional languages / Scheme / Source code / Object-oriented programming languages / Hygienic macro / Racket features / Macro / Racket / Syntax

    Languages the Racket Way 2016 Language Workbench Challenge Daniel Feltey Spencer P. Florence

    Add to Reading List

    Source URL: www.ece.northwestern.edu

    Language: English - Date: 2016-11-07 18:21:29
    64Formal methods / Theoretical computer science / Software engineering / Systems engineering / Software testing / Quality / Software quality / Software verification and validation / Formal verification / Functional verification / Model checking / Verification and validation

    On Using Results of Code-level Bounded Model Checking in Assurance Cases Carmen Cˆ arlan, Daniel Ratiu, and Bernhard Sch¨atz fortiss GmbH, Munich, email: Siemens CT, Munich, email: daniel.ratiu@sieme

    Add to Reading List

    Source URL: mbeddr.com

    Language: English - Date: 2018-08-02 04:06:51
    65

    GRADUATE SEMINAR Daniel Krumer Abstract Sub-Product Systems MSc Student supervised by Remus Floricel March 12, 2018

    Add to Reading List

    Source URL: www.uregina.ca

    - Date: 2018-02-26 14:04:52
      66Computer architecture / Computing / Computer hardware / Computer memory / Memory management / Virtual memory / X86 architecture / Computer security / Meltdown / Translation lookaside buffer / CPU cache / Software Guard Extensions

      Foreshadow-NG: Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution Revision 1.0 (August 14, 2018) Ofir Weisse3 , Jo Van Bulck1 , Marina Minkin2 , Daniel Genkin3 , Baris Kasikci3 , Frank Piessens

      Add to Reading List

      Source URL: foreshadowattack.eu

      Language: English - Date: 2018-08-31 11:04:51
      67Computing / Object-oriented programming languages / Scripting languages / Programming languages / Java platform / Java specification requests / Da Vinci Machine / Java bytecode / JRuby / Java virtual machine / Java class file / Scala

      Mining Method Handle Graphs for Efficient Dynamic JVM Languages Shijie Xu, David Bremner Daniel Heidinga

      Add to Reading List

      Source URL: xushijie.github.io

      Language: English - Date: 2018-09-18 22:05:07
      68Formal methods / Software engineering / Theoretical computer science / Predicate transformer semantics / Computing / Loop invariant / Invariant / 120-cell

      Compositional Safety Verification with Max-SMT Marc Brockschmidt ∗ , Daniel Larraz † , Albert Oliveras † , Enric Rodr´ıguez-Carbonell † and Albert Rubio

      Add to Reading List

      Source URL: www.lsi.upc.edu

      Language: English - Date: 2015-07-15 04:42:02
      69Formal languages / Tree / Heap / Binary tree / Context-free grammar / Computing / Software engineering / Mathematics / Regular tree grammar

      Learning Shape Analysis Marc Brockschmidt1 , Yuxin Chen2 , Pushmeet Kohli3 , Siddharth Krishna4 , and Daniel Tarlow5 1 Microsoft Research, 2 ETH Z¨

      Add to Reading List

      Source URL: www.microsoft.com

      Language: English - Date: 2018-01-04 03:04:14
      70Parallel computing / Application programming interfaces / Computer programming / Message Passing Interface / Computing / Edsger W. Dijkstra / Deadlock / NC / Software engineering / Model checking

      Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs Vojtˇech Forejt, Daniel Kroening, Ganesh Narayanaswamy, and Subodh Sharma Department of Computer Science, University of Oxford, UK Abs

      Add to Reading List

      Source URL: qav.comlab.ox.ac.uk

      Language: English - Date: 2014-02-26 06:04:38
      UPDATE