David Roger

Results: 256



#Item
11

Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

Add to Reading List

Source URL: www.tik.ee.ethz.ch

- Date: 2015-05-18 12:16:38
    12

    RMM Vol. 3, 2012, 148–167 Special Topic: Coevolving Relationships between Political Science and Economics Edited by Herbert David, Hartmut Kliemt and Elinor Ostrom http://www.rmm-journal.de/ Achim Schlüter and Róger

    Add to Reading List

    Source URL: www.rmm-journal.com

    - Date: 2012-11-01 06:26:29
      13

      RMM Vol. 3, 2012, 148–167 Special Topic: Coevolving Relationships between Political Science and Economics Edited by Herbert David, Hartmut Kliemt and Elinor Ostrom http://www.rmm-journal.de/ Achim Schlüter and Róger

      Add to Reading List

      Source URL: www.rmm-journal.com

      - Date: 2012-11-01 06:25:15
        14

        Minutes Council of Assistant and Associate Deans (CAAD) October 9, 2014 Attendance: Lisa Lindquist-Dorr, Luoheng Han, Robert Hayes, Roger Sidje, Tricia McElroy, David Heggem, Sara Hartley, Leroy, Hurt, Dixie Macneil, Liz

        Add to Reading List

        Source URL: committees.ua.edu

        - Date: 2015-02-10 11:57:33
          15Nevada / Southern Nevada / Las Vegas / Law / Interstate 15 in Nevada / Probation / Record sealing / David Roger

          7th Annual Community Law Day Judges, Lawyers, Police, Community Leaders and Law Students Helping Others Saturday, August 27, 2016 9:00 a.m. to 12:00 p.m. Doolittle Community Center

          Add to Reading List

          Source URL: detr.state.nv.us

          Language: English - Date: 2016-08-03 21:24:06
          16Transaction processing / Computing / Data management / Concurrency control / Software / Databases / Software transactional memory / Schedule / Database transaction / Transactional memory / Lock / Extensible Storage Engine

          Transactional Memory: How to Perform Load Adaption in a Simple And Distributed Manner David Hasenfratz, Johannes Schneider, Roger Wattenhofer Computer Engineering and Networks Laboratory, ETH Zurich, 8092 Zurich, Switzer

          Add to Reading List

          Source URL: disco.ethz.ch

          Language: English - Date: 2014-09-26 08:36:30
          17File sharing networks / Computing / Software / File sharing / EDonkey network / Kad network / EMule / Peer-to-peer / Gnutella / Distributed hash table / Kademlia / BitTorrent

          A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

          Add to Reading List

          Source URL: www.tik.ee.ethz.ch

          Language: English - Date: 2015-05-18 12:16:16
          18Crime / American football / National Football League / O. J. Simpson robbery case / Criminal defense lawyers / O. J. Simpson / Yale Galanter / David Roger

          New charges filed in O.J. Simpson case By KEN RITTER, Associated Press Writer Wed Oct 24, 3:02 PM ET LAS VEGAS - New charges of felony coercion were filed Wednesday against O.J. Simpson and three co-defendants in the all

          Add to Reading List

          Source URL: www.lasvegascrimelawyer.com

          Language: English - Date: 2008-08-29 00:44:32
          19Physics / Quantum mechanics / Academia / Quantum measurement / Philosophy of physics / Fellows of the Royal Society / Quantum mind / David Bohm / Holomovement / Implicate and explicate order / Hidden variable theory / Copenhagen interpretation

          David Bohm, Roger Penrose, and the Search for Non-local Causality Before they met, David Bohm and Roger Penrose each puzzled over the paradox of the arrow of time. After they met, the case for projective physical space b

          Add to Reading List

          Source URL: tonyrobbin.net

          Language: English - Date: 2014-03-12 11:30:06
          20Computer security / Cryptography / Computing / Security / Trusted Platform Module / Data in use / Embedded system / Physical unclonable function / Trusted Computing / Software / Operating system / Key management

          Secure Embedded Systems Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin, Sean R. O’Melia, and Roger I. Khazan Developers seek to seamlessly integrate cyber

          Add to Reading List

          Source URL: www.ll.mit.edu

          Language: English - Date: 2016-07-12 15:07:52
          UPDATE