IBM Research

Results: 1429



#Item
31

ACM Tech Pack on Cloud Computing Ajay Mohindra, IBM Research Division, Thomas J. Watson Research Center Chair, ACM Tech Pack Committee on Cloud Computing Copyright © ACM 2015

Add to Reading List

Source URL: techpack.acm.org

Language: English - Date: 2015-01-28 17:29:06
    32

    Designed as Designer Richard P. Gabriel IBM Research Hawthorne, New York USA {

    Add to Reading List

    Source URL: www.dreamsongs.com

    Language: English - Date: 2012-08-04 15:55:06
      33

      IBM Research The Utility of Utility: Policies for Autonomic Computing Jeff Kephart ()

      Add to Reading List

      Source URL: www.policy-workshop.org

      Language: English - Date: 2011-06-13 06:57:20
        34Mathematics / Computer security / Obfuscation / Source code / Function / One-way function / Computing / Software engineering

        Obfuscating Point Functions with Multibit Output Ran Canetti1 and Ronny Ramzi Dakdouk2? 1 IBM T. J. Watson Research Center, Hawthorne, NY.

        Add to Reading List

        Source URL: www.cs.tau.ac.il

        Language: English - Date: 2008-11-05 15:42:35
        35

        Hyperledger Fabric V1 Christian Cachin (with many others, at IBM Zurich & elsewhere; special thanks to Marko Vukolic) IBM Research – Zurich October 2017

        Add to Reading List

        Source URL: 2017.blockchain-workshop.net

        Language: English - Date: 2017-10-16 16:39:36
          36

          Comparing Information Without Leaking It Ronald Fagin Moni Naor IBM Research Division Dept. of Applied Math Almaden Research Center

          Add to Reading List

          Source URL: www.stat.berkeley.edu

          Language: English - Date: 2011-10-20 13:56:40
            37

            Michael Waidner () IBM Corporation, Research Division Zurich Research Laboratory Secure Electronic MarketPlace for EuRope:

            Add to Reading List

            Source URL: www.semper.org

            Language: English - Date: 2011-10-26 07:11:08
              38

              A Virtualization Assurance Language for Isolation and Deployment Sören Bleikertz and Thomas Groß IBM Research – Zurich © 2009 IBM Corporation

              Add to Reading List

              Source URL: www.policy-workshop.org

              Language: English - Date: 2011-06-15 10:34:48
                39

                Program Anomaly Detection: Methodology and Practices Xiaokui Shu Danfeng Yao IBM Research

                Add to Reading List

                Source URL: people.cs.vt.edu

                Language: English - Date: 2016-08-19 07:09:32
                  40

                  B-trees, Shadowing, and Clones Ohad Rodeh IBM Haifa Research Labs B-trees are used by many file-systems to represent files and directories. They provide guarantied logarithmic time key-search, insert, and remove. File sy

                  Add to Reading List

                  Source URL: btrfs.wiki.kernel.org

                  Language: English - Date: 2016-10-16 16:09:33
                    UPDATE