Hidden

Results: 5368



#Item
151

Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services Albert Kwon, Massachusetts Institute of Technology; Mashael AlSabah, Qatar Computing Research Institute, Qatar University, and Massachusetts

Add to Reading List

Source URL: www.usenix.org

- Date: 2016-02-22 01:46:44
    152

    Sand Wars Beijing’s Hidden Ambition in the South China Sea Amanda C. Blair

    Add to Reading List

    Source URL: www.wm.edu

    - Date: 2016-12-28 21:09:19
      153

      Dependency Tree-based Sentiment Classification using CRFs with Hidden Variables ∗ Tetsuji Nakagawa∗ , Kentaro Inui∗† and Sadao Kurohashi∗‡ National Institute of Information and Communications Technology

      Add to Reading List

      Source URL: aclweb.org

      - Date: 2010-06-14 21:31:18
        154

        Importing Ontologies with Hidden Content Bernardo Cuenca Grau and Boris Motik Computing Laboratory University of Oxford, UK 1

        Add to Reading List

        Source URL: ceur-ws.org

        - Date: 2009-07-07 04:46:34
          155

          The Hidden Power of Abstract Argumentation Semantics Thomas Linsbichler1 , Christof Spanring1,2 , and Stefan Woltran1 1 2

          Add to Reading List

          Source URL: homepages.abdn.ac.uk

          - Date: 2015-06-18 05:47:28
            156

            Hidden Profiles and Persuasion Cascades in Group Decision-Making Saori Chiba†and Marco LiCalzi‡ Current draft: May 5, 2016 Abstract

            Add to Reading List

            Source URL: www.econ.kyoto-u.ac.jp

            - Date: 2016-05-05 08:43:57
              157

              Designing and implementing malicious hardware Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou University of Illinois at Urbana Champaign, Urbana, ILAbstract Hidden malic

              Add to Reading List

              Source URL: www.usenix.org

              - Date: 2008-03-26 10:36:20
                158

                Appears in Proceedings of the Annual Meeting of the Cognitive Science Society, 2016 (CogSciMind reading: Discovering individual preferences from eye movements using switching hidden Markov models Tim Chuk (u30025

                Add to Reading List

                Source URL: visal.cs.cityu.edu.hk

                - Date: 2016-11-28 01:40:00
                  159

                  Tagging with Hidden Markov Models Michael Collins 1 Tagging Problems

                  Add to Reading List

                  Source URL: www.cs.columbia.edu

                  - Date: 2011-09-15 10:36:58
                    160

                    Thomas Lidbetter A caching game with infinitely divisible hidden material Article (Accepted version) (Refereed)

                    Add to Reading List

                    Source URL: eprints.lse.ac.uk

                    - Date: 2015-11-23 10:50:15
                      UPDATE