H-Net

Results: 5139



#Item
731

SPRING 2015 S O U T H E R N VOL. 33, NO. 1 S T A T E S

Add to Reading List

Source URL: www.ssca.net

Language: English - Date: 2015-01-21 15:28:17
    732

    Axiomatic and Tableau-Based Reasoning for Kt(H,R) Renate A. Schmidt 1 School of Computer Science University of Manchester, Manchester, UK

    Add to Reading List

    Source URL: www.aiml.net

    Language: English - Date: 2014-09-20 05:24:50
      733

      C HA R L E S H . P E N C E Louisiana State University Department of Philosophy and Religious Studies 102 Coates Hall Baton Rouge, LA 70803

      Add to Reading List

      Source URL: charlespence.net

      Language: English - Date: 2016-02-02 08:48:16
        734

        U K I - E n t e r t h e B i o Ne t L’installation interactive Enter the BioNet nous projette dans le futur, dans un scénario de science-fiction dans lequel le Net, l’Internet de notre temps, s’est effondré. La Ge

        Add to Reading List

        Source URL: u-k-i.co

        Language: French - Date: 2015-04-22 07:16:52
          735

          Assessing Damages of Information Security Incidents and Selecting Control Measures, a Case Study Approach Fariborz Farahmand, Shamkant B. Navathe, Gunter P. Sharp, Philip H. Enslow Georgia Institute of Technology Abstra

          Add to Reading List

          Source URL: infosecon.net

          Language: English - Date: 2006-03-16 20:15:32
            736

            L’s y T h r AB 30t ersa iv n

            Add to Reading List

            Source URL: id3419.securedata.net

            Language: English - Date: 2004-01-23 18:28:55
              737

              If you have not already visited our banking office or surfed on our website, you will be pleased to know that even though we h

              Add to Reading List

              Source URL: www.lighthousebank.net

              Language: English - Date: 2008-08-05 10:15:08
                738

                September 2011 Volume 2 Issue 8 A p ub l i c at i o n o f P r o A V, I n c . • Sa l es , De s i gn & I n s t al l a t io n of Au d i o, Vi d e o , L ig h t in g & Ke y bo a r d s When and How to EQ - You Have the Power

                Add to Reading List

                Source URL: www.myproav.net

                Language: English - Date: 2012-06-28 14:23:27
                  739

                  Semantic Security and Indistinguishability in the Quantum World (extended abstract of arXiv:for QCRYPTTommaso Gagliardoni∗, Andreas H¨ ulsing†, and Christian Schaffner‡

                  Add to Reading List

                  Source URL: 2015.qcrypt.net

                  Language: English - Date: 2015-09-22 01:45:35
                    740

                    Random Number Selection in Self-Assembly David Doty⋆ , Jack H. Lutz⋆⋆ , Matthew J. Patitz⋆ ⋆ ⋆ , Scott M. Summers† , and Damien Woods‡ Abstract. We investigate methods for exploiting nondeterminism inhere

                    Add to Reading List

                    Source URL: www.self-assembly.net

                    Language: English - Date: 2009-06-03 15:00:59
                      UPDATE