Imperfect

Results: 1563



#Item
1Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
    2Hartmut S. Leipner, Reinhard Krause-Rehberg  Structure of imperfect solids (2) A. Advanced topics B. Methods

    Hartmut S. Leipner, Reinhard Krause-Rehberg Structure of imperfect solids (2) A. Advanced topics B. Methods

    Add to Reading List

    Source URL: www.cmat.uni-halle.de

    Language: English - Date: 2003-10-10 05:25:07
      3236  Problems with Imperfect State Information Chap. 5

      236 Problems with Imperfect State Information Chap. 5

      Add to Reading List

      Source URL: www.athenasc.com

      Language: English - Date: 2017-02-01 13:25:12
        4Graph Inference with Imperfect Edge Classifiers  Michael W. Trosset Department of Statistics Indiana University

        Graph Inference with Imperfect Edge Classifiers Michael W. Trosset Department of Statistics Indiana University

        Add to Reading List

        Source URL: www.ams.jhu.edu

        Language: English - Date: 2012-05-24 16:38:24
          5A Testable Theory of Imperfect Perception Andrew Capliny and Daniel Martinz First version: June 15, 2011; Latest version: June 11, 2013 Abstract We provide a new characterization of Bayesian expected utility maximization

          A Testable Theory of Imperfect Perception Andrew Capliny and Daniel Martinz First version: June 15, 2011; Latest version: June 11, 2013 Abstract We provide a new characterization of Bayesian expected utility maximization

          Add to Reading List

          Source URL: users.sussex.ac.uk

          Language: English - Date: 2017-11-01 11:39:53
            6Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

            Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

            Add to Reading List

            Source URL: benjaminvandersloot.com

            Language: English - Date: 2018-05-07 11:00:06
              7Cryptography from Sunspots: How to Use an Imperfect Reference String Ran Canetti∗† IBM  Rafael Pass‡†

              Cryptography from Sunspots: How to Use an Imperfect Reference String Ran Canetti∗† IBM Rafael Pass‡†

              Add to Reading List

              Source URL: people.csail.mit.edu

              Language: English - Date: 2007-12-16 00:26:33
                8DISCUSSION PAPER SERIES  IZA DP NoSurvey Item-Response Behavior as an Imperfect Proxy for Unobserved Ability:

                DISCUSSION PAPER SERIES IZA DP NoSurvey Item-Response Behavior as an Imperfect Proxy for Unobserved Ability:

                Add to Reading List

                Source URL: ftp.iza.org

                Language: English - Date: 2018-05-03 05:05:56
                  9GLOBAL ILLUMINATION USING IMPERFECT VOLUMES  Pavlos Mavridis , Georgios Papaioannou Department of Informatics, Athens University of Economics & Business, Greece ,

                  GLOBAL ILLUMINATION USING IMPERFECT VOLUMES Pavlos Mavridis , Georgios Papaioannou Department of Informatics, Athens University of Economics & Business, Greece ,

                  Add to Reading List

                  Source URL: graphics.cs.aueb.gr

                  - Date: 2013-09-14 08:30:01
                    10Active Learning from Imperfect Labelers Songbai Yan UC San Diego   Kamalika Chaudhuri

                    Active Learning from Imperfect Labelers Songbai Yan UC San Diego Kamalika Chaudhuri

                    Add to Reading List

                    Source URL: cseweb.ucsd.edu

                    - Date: 2016-09-28 19:40:23