FOR-A

Results: 646152



#Item
411Search algorithms / Information retrieval / Information science / Cryptography / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Hopf decomposition / Compound of twelve pentagonal antiprisms with rotational freedom

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
412Computer programming / Software engineering / Computing / Lisp / Functional languages / Subroutines / Programming languages / Data types / Functional programming / Defun / ACL2 / Cons

A Versatile, Sound Tool for Simplifying Definitions Alessandro Coglio Matt Kaufmann Kestrel Institute

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2017-04-21 01:19:46
413Radio-frequency identification / Automatic identification and data capture / Privacy / Ubiquitous computing / Wireless / Mobile RFID / SAM / Computing / Technology / Data

A Parallel Identification Protocol for RFID Systems Linghe Kong∗† , Liang He∗ , Yu Gu∗ , Min-You Wu† , Tian He‡ ∗ Singapore University of Technology and Design, Singapore † Shanghai Jiao Tong University,

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-14 12:02:36
414Models of computation / Concurrency / Computing / Formal methods / Diagrams / Petri net / Finite automata / Model checking / Analog television / Finite-state machine / Actor model / Information and communications technology

DYNAMIC SYNC-PROGRAMS FOR MODULAR VERIFICATION OF BIOLOGICAL SYSTEMS Peter Dr´abik, Andrea Maggiolo-Schettini and Paolo Milazzo Dipartimento di Informatica, Universit`a di Pisa

Add to Reading List

Source URL: pages.di.unipi.it

Language: English - Date: 2015-12-18 06:55:15
415Computing / Cyberwarfare / Concurrent computing / Computer security / Computer network security / Denial-of-service attacks / DDoS mitigation / System administration / Denial-of-service attack / Content delivery network / High Orbit Ion Cannon / Botnet

What to Look for When Choosing a CDN for DDoS Protection Written by Bizety Introduction WHITE PAPER

Add to Reading List

Source URL: www.fastly.com

Language: English - Date: 2017-05-05 00:23:45
416

OpenRec: A Modular Framework for Extensible and Adaptable Recommendation Algorithms

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2018-10-25 09:08:11
    417Unmanned aerial vehicles / Air racing / Robotics / Drone racing / Drone / Technology / Electronics / Control engineering

    Registration Form for IROS 2018 Autonomous Drone Racing in City of Theed Madrid Arena Team title: YOUR TEAM NAME

    Add to Reading List

    Source URL: ris.skku.edu

    Language: English - Date: 2018-07-18 02:07:08
    418Economy / Finance / Money / Investment management / Investment / International development / Economic geography / Emerging market / Portfolio manager / Nordea

    What kind of growth to expect from Emerging Markets? Emerging Markets (EM) have been experiencing strong growth levels for a long period. In recent periods, however, growth in EM has come into question. Specific issues i

    Add to Reading List

    Source URL: www.fundexpertsforum.com

    Language: English - Date: 2018-05-29 09:59:00
    419Systems theory / Differential equations / Metaphysics / Control theory / Hybrid system / Mathematical analysis / Dynamical system / Mathematics / Symbol / Hybrid automaton

    C2E2: A Verification Tool For Stateflow Models Parasara Sridhar Duggirala1 , Sayan Mitra2 , Mahesh Viswanathan1 , and Matthew Potok2 1 2

    Add to Reading List

    Source URL: publish.illinois.edu

    Language: English - Date: 2015-02-09 14:29:37
    420Bots / Software / Computing / Digital media / Twitter bot / Twitter / Internet bot / Social media / Video game bot / Spambot / Botnet / CongressEdits

    Stweeler: A Framework for Twitter Bot Analysis Zafar Gilani, Liang Wang, Jon Crowcroft University of Cambridge {szuhg2, lw525, jac22}

    Add to Reading List

    Source URL: gdac.uqam.ca

    Language: English - Date: 2017-10-04 00:38:21
    UPDATE