Dmitry

Results: 773



#Item
171

Argon v1: Password Hashing Scheme Designers: Alex Biryukov and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/i

Add to Reading List

Source URL: www.cryptolux.org

Language: English - Date: 2014-04-07 07:03:55
    172

    KEEP IT SYNPLE STUPID Utilizing Programmable Logic for Analyzing Hardware Targets Dmitry Nedospasov <> SHORT DESCRIPTION Hardware security analysis differs from software security analysis primarily in the

    Add to Reading List

    Source URL: sandiego.toorcon.net

    Language: English - Date: 2015-07-28 23:39:24
      173

      Energy, Memory, and Runtime Tradeoffs for Implementing Collective Communication Operations Torsten Hoefler and Dmitry Moor, ETH Zurich ¨ 1. Introduction

      Add to Reading List

      Source URL: spcl.inf.ethz.ch

      Language: English
        174Wireless networking / Technology / Wireless / Mobile technology / Mobile telecommunications / Telecommunications / Radio resource management / Network access / Backhaul / Internet access / LTE / Flow

        IncrEase: A Tool for Incremental Planning of Rural Fixed Broadband Wireless Access Networks Giacomo Bernardi and Mahesh K. Marina Francesco Talamona and Dmitry Rykovanov

        Add to Reading List

        Source URL: minux.it

        Language: English - Date: 2011-11-18 12:15:27
        175

        Deciding ALBO with Tableau Renate A. Schmidt1 and Dmitry Tishkovsky1 School of Computer Science, The University of Manchester {renate.schmidt,dmitry.tishkovsky}@manchester.ac.uk This paper presents a tableau approach for

        Add to Reading List

        Source URL: sunsite.informatik.rwth-aachen.de

        Language: English - Date: 2007-05-22 01:39:22
          176Network architecture / Emerging technologies / Configuration management / Software-defined networking / OpenFlow / Network virtualization / Nox / Network function virtualization / Virtualization / Virtual appliance / Hewlett Packard Enterprise Networking / Storage virtualization

          Scalable Network Virtualization in Software-Defined Networks Dmitry Drutskoy Eric Keller

          Add to Reading List

          Source URL: www.cs.princeton.edu

          Language: English - Date: 2012-10-04 16:00:37
          177

          Using Tableau to Decide Description Logics with Full Role Negation and Identity Renate A. Schmidt Dmitry Tishkovsky School of Computer Science, The Unive

          Add to Reading List

          Source URL: www.mettel-prover.org

          Language: English - Date: 2014-04-01 08:48:03
            178

            Deanonymisation of clients in Bitcoin P2P network Alex Biryukov Dmitry Khovratovich Ivan Pustogarov

            Add to Reading List

            Source URL: arxiv.org

            Language: English - Date: 2014-06-03 20:15:27
              179

              Information Communication Technologies and Framing for Backfire in the Digital Rights Movement: the Case of Dmitry Sklyarov’s Advanced e-Book Processor Hector Postigo Associate Professor, Broadcasting Telecommunication

              Add to Reading List

              Source URL: www.bmartin.cc

              Language: English - Date: 2010-01-30 19:04:55
                180

                Terminating tableau calculi for modal logic K with global counting operators Mohammad Khodadadi, Renate A. Schmidt, Dmitry Tishkovsky School of Computer Science, The University of Manchester, United Kingdom Michal Zawid

                Add to Reading List

                Source URL: www.mettel-prover.org

                Language: English - Date: 2014-04-01 08:48:03
                  UPDATE