Edu

Results: 1439644



#Item
341Computing / Cloud infrastructure / Cloud computing / IT infrastructure / Serverless computing / Information and communications technology / Email

DIY Hosting for Online Privacy Shoumik Palkar and Matei Zaharia Stanford University Before: A Federated Internet The Internet and its protocols were designed to be federated

Add to Reading List

Source URL: platformlab.stanford.edu

Language: English - Date: 2018-06-18 15:29:57
342Computing / Data types / Software engineering / Type theory / Mathematics / Rendering / Const / Record / Integer / Tagged union / Tuple / Type system

A Refinement Approach to Visualization* Allen Goldberg Rafael Furst Cordell Green Kestrel Institute 3260 Hillview Ave

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-08 19:10:59
343Computational science / Applied mathematics / Modeling and simulation / Scientific modeling / Simulation / Computer simulation / Control theory / Self-driving car / Systems science

Utilizing S-TaLiRo as an Automatic Test Generation Framework for Autonomous Vehicles Cumhur Erkan Tuncali, Theodore P. Pavlic and Georgios Fainekos Abstract— This paper proposes an approach to automatically generating

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2018-02-08 19:28:54
344

NeuroImage–48 Contents lists available at ScienceDirect NeuroImage journal homepage: www.elsevier.com/locate/ynimg

Add to Reading List

Source URL: saxelab.mit.edu

Language: English - Date: 2016-01-07 10:44:09
    345Logic / Mathematics / Automated theorem proving / Logic programming / Mathematical logic / Logical truth / Propositional calculus / Substitution / Measure theory / operator / Decomposition of spectrum

    Cost-Based Learning for Planning Srinivas Nedunuri and William R. Cook Douglas R. Smith Dept. of Computer Science, University of Texas at Austin

    Add to Reading List

    Source URL: www.kestrel.edu

    Language: English - Date: 2014-10-03 20:52:55
    346System software / Software / Utility software / Computer forensics / Password / Security / Disk image / VirtualBox / Autopsy / File system / Forensic science

    EECS 388 Intro to Computer Security November 18, 2016 Project 5: Forensics

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2016-11-21 18:50:22
    347

    Exercise Science K-12_BS.pdf

    Add to Reading List

    Source URL: catalog.southernct.edu

    Language: English - Date: 2018-10-06 18:05:08
      348Computing / Internet / Information and communications technology / Internet protocols / Internet privacy / Internet security / Internet Standards / Cryptographic protocols / Proxy server / Transmission Control Protocol / DNS hijacking / SOCKS

      figs/connectivity_t1s_numprobes.eps

      Add to Reading List

      Source URL: people.cs.umass.edu

      Language: English - Date: 2014-06-24 12:29:11
      349

      北航外籍教师聘用申报表 编号: 填表日期: 年 月 日 聘用院(系) 拟聘外教姓名

      Add to Reading List

      Source URL: id.buaa.edu.cn

      Language: Chinese - Date: 2017-11-03 13:49:20
        350Criminology / Penology / Psychopathy / Recidivism / Expected value / Human behavior

        Manski Bounds Alex Tabarrok George Mason Universtiy January 2008

        Add to Reading List

        Source URL: mason.gmu.edu

        Language: English - Date: 2008-02-21 13:18:57
        UPDATE