In Practice

Results: 30029



#Item
1Trojan-tolerant Hardware  + Supply Chain Security in Practice Vasilios Mavroudis

Trojan-tolerant Hardware + Supply Chain Security in Practice Vasilios Mavroudis

Add to Reading List

Source URL: backdoortolerance.org

Language: English - Date: 2018-03-13 07:04:44
2Critical Thinking in Context: Practice at an American Liberal Arts University in Egypt Author: Maha Ayham Bali Mohamed Bali For the degree of: PhD Department: School of Education

Critical Thinking in Context: Practice at an American Liberal Arts University in Egypt Author: Maha Ayham Bali Mohamed Bali For the degree of: PhD Department: School of Education

Add to Reading List

Source URL: etheses.whiterose.ac.uk

Language: English - Date: 2013-10-26 13:12:29
3Active Automata Learning in Practice An Annotated Bibliography of the Years 2011 to 2016 Falk Howar1 and Bernhard Steffen2 1  Dortmund University of Technology and Fraunhofer ISST, Dortmund, Germany

Active Automata Learning in Practice An Annotated Bibliography of the Years 2011 to 2016 Falk Howar1 and Bernhard Steffen2 1 Dortmund University of Technology and Fraunhofer ISST, Dortmund, Germany

Add to Reading List

Source URL: www.falkhowar.de

Language: English - Date: 2018-09-30 08:43:02
4(Dis)connective Practice in Heterotopic Spaces for Networked and Connected Learning Frances Bell Itinerant Scholar  Abstract

(Dis)connective Practice in Heterotopic Spaces for Networked and Connected Learning Frances Bell Itinerant Scholar Abstract

Add to Reading List

Source URL: www.networkedlearningconference.org.uk

Language: English - Date: 2017-05-04 14:07:54
5

"Good Practice-Leitlinien" für ICOs trennen die Spreu vom Weizen • Fulminantes Wachstum von ICOs in 2017 auf ein Emissionsvolumen von

Add to Reading List

Source URL: www.svs-capitalpartners.com

Language: German - Date: 2018-04-30 11:00:55
    6Under consideration for publication in Theory and Practice of Logic Programming  1 Horn Clauses as an Intermediate Representation for Program Analysis and Transformation∗

    Under consideration for publication in Theory and Practice of Logic Programming 1 Horn Clauses as an Intermediate Representation for Program Analysis and Transformation∗

    Add to Reading List

    Source URL: jorgenavas.github.io

    Language: English - Date: 2018-10-25 12:43:22
    7Thomson Reuters Elektron Data Platform Real-Time Venue Data For MiFID II MiFID II is redefining best practice in our industry Organizations bound by MiFID II are now finding that rules around pre- and post-trade transpar

    Thomson Reuters Elektron Data Platform Real-Time Venue Data For MiFID II MiFID II is redefining best practice in our industry Organizations bound by MiFID II are now finding that rules around pre- and post-trade transpar

    Add to Reading List

    Source URL: mifidii.thomsonreuters.com

    Language: English - Date: 2018-10-21 02:07:04
    8All in the XL Family: Theory and Practice Bo-Yin Yang1, and Jiun-Ming Chen2 1 Department of Mathematics, Tamkang University, Tamsui, Taiwan

    All in the XL Family: Theory and Practice Bo-Yin Yang1, and Jiun-Ming Chen2 1 Department of Mathematics, Tamkang University, Tamsui, Taiwan

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2011-03-20 04:03:41
    9This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

    This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2017-12-13 06:49:27