IS-IS

Results: 915390



#Item
271Web accessibility / Computer accessibility / Web development / Urban planning / Web Content Accessibility Guidelines / Accessibility / Section 508 Amendment to the Rehabilitation Act / Assistive technology / Web Accessibility Initiative

ACCESSIBILITY STATEMENT     General Statement  Utah Schools for the Deaf and the Blind has made every effort to ensure that the content on this website  is accessible to everyone, including users of assistive techno

Add to Reading List

Source URL: www.usdb.org

Language: English - Date: 2018-08-16 23:03:21
272Blockchains / Cryptocurrencies / Concurrent computing / Bitcoin / Computing / Decentralization / Distributed computing / Alternative currencies / Ethereum / Fork / RootStock / Distributed ledger

Blockchain Economics∗ Joseph Abadi and Markus Brunnermeier† August 25, 2018 Abstract When is record-keeping better arranged through distributed ledger technology (DLT)

Add to Reading List

Source URL: scholar.princeton.edu

Language: English - Date: 2018-08-28 16:42:20
273Arbitration / Arbitral tribunal / Law / American Arbitration Association / Crowdrise / Economy

THE DUCKDUCKGO $500,000 PRIVACY CHALLENGE GEAR UP BONUS CHALLENGE OFFICIAL RULES The DuckDuckGo $500,000 Privacy Challenge (the “Challenge”) Gear Up Bonus Challenge (hereinafter, the “Contest”) is sponsored by Du

Add to Reading List

Source URL: cdncustom.crowdrise.com

Language: English - Date: 2018-02-26 13:09:16
274Julian calendar

Timetable SpringDRAFT Modular courses Course ECTS

Add to Reading List

Source URL: en.ru.is

Language: English - Date: 2018-09-13 10:42:03
    275Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher

    NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

    Add to Reading List

    Source URL: www.nucypher.com

    Language: English
    276Algebra / Mathematics / Polynomials / Abstract algebra / Polynomial / Irreducible polynomial / Factorization of polynomials / Resultant / Algebraic geometry / Factorization / Polynomial greatest common divisor / Permutation polynomial

    LibPoly: A Library for Reasoning about Polynomials∗ Dejan Jovanovi´c and Bruno Dutertre SRI International Abstract LibPoly is a C library for computing with polynomials. It provides data structures to represent multiv

    Add to Reading List

    Source URL: smt-workshop.cs.uiowa.edu

    Language: English - Date: 2017-09-02 14:08:49
    277Computational neuroscience / Chemistry / Applied mathematics / Artificial neural networks / Phase transitions / Statistics / Scientific modeling / Design of experiments / Deep learning / Distillation / Outlier / Surrogate model

    A full version of this paper is available at https://papernot.fr/files/extending-distillation.pdf Poster: Extending Defensive Distillation Nicolas Papernot and Patrick McDaniel Pennsylvania State University {ngp5056,mcd

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 02:41:14
    278Marketing / Economy / Microeconomics / Brand management / Product management / Double jeopardy / Brand loyalty / Brand / Consumer behaviour / Marketing strategy / Positioning

    xii Preface These patterns are valuable knowledge. It’s often thought that great marketing strategy is obvious—with hindsight everyone can see what you

    Add to Reading List

    Source URL: download.audible.com

    Language: English - Date: 2014-01-31 13:20:02
    279Cryptography / Post-quantum cryptography / Quantum cryptography / Emerging technologies / Quantum computing / Key / Supersingular isogeny key exchange / Ring learning with errors key exchange

    Is Java Card ready for hash-based signatures? Ebo van der Laan1 , Erik Poll2 , Joost Rijneveld2 , Joeri de Ruiter2 , Peter Schwabe2 and Jan Verschuren1 1 Netherlands National Communication Security Agency (NLNCSA)

    Add to Reading List

    Source URL: joostrijneveld.nl

    Language: English - Date: 2018-09-03 08:56:26
    280Academic publishing / Knowledge / Publishing / Human behavior / Intellectual property law / Grey literature / Manuscript / Writing / Electronic submission / Copyright

    River Publishers Guidelines for Authors Submitting a Journal Paper Preparing your manuscript Please use these guidelines to ensure that your manuscript is complete prior to submission of your article.

    Add to Reading List

    Source URL: www.riverpublishers.com

    Language: English - Date: 2017-08-09 03:35:35
    UPDATE