Lee

Results: 18787



#Item
11

Publicado en Septiembre deEste documento usa la versión 6.0 de NetLogo. Traducido al Castellano por Haroldo Miranda. Tutorial # 1. Modelos Si lee la sección Modelo de muestra: Party, tendrá una breve introducci

Add to Reading List

Source URL: ccl.northwestern.edu

Language: Spanish - Date: 2018-09-19 16:41:35
    12Sorting algorithms / Order theory / Mathematics / Computing / Bucket sort / Radix sort / Merge sort / Partition / Merge algorithm / Sorting

    Millisort: An Experiment in Granular Computing Seo Jin Park with Yilong Li, Collin Lee and John Ousterhout Massively Parallel Granular Computing

    Add to Reading List

    Source URL: platformlab.stanford.edu

    Language: English - Date: 2018-06-18 15:29:53
    13Culture / Technology / Internet culture / Human behavior / Demographics / Intelligent Community Forum / Pew Research Center / Digital addict / Social media / News media / Opinion poll / Generation Z

    FOR RELEASE APRIL 17, 2018 BY Janna Anderson and Lee Rainie FOR MEDIA OR OTHER INQUIRIES: Janna Anderson, Director, Imagining the Internet Center

    Add to Reading List

    Source URL: assets.pewresearch.org

    Language: English - Date: 2018-06-14 15:45:53
    14Mathematical logic / Mathematics / Logic / Type theory / Model theory / Hierarchy / Interpretation / Axiom / Sheaf / Theory / Implementation of mathematics in set theory / ZermeloFraenkel set theory

    Dtre|A Semi-Automatic Transformation System Lee Blaine and Allen Goldberg Kestrel Institute, 3260 Hillview Avenue, Palo Alto, California 94304, USA Abstract

    Add to Reading List

    Source URL: www.kestrel.edu

    Language: English - Date: 2012-08-08 19:03:01
    15Computing / Android / Computer architecture / System software / Smartphones / Social engineering / IOS / Mach / Google Play / Clickjacking / Yo / Mobile security

    Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Yanick Fratantonio Chenxiong Qian, Simon P. Chung, Wenke Lee

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:33
    16

    Source Accountability with Domain-brokered Privacy Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig ETH Zürich {kthlee, pappasch, david.barrera, psz, adrian.perrig}@inf.ethz.ch ABSTRACT

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
      17Computational linguistics / Linguistics / Semantics / Applied linguistics / Computational science / Natural language processing / Artificial neural networks / Lexical semantics / Word2vec / Semantic similarity / Word embedding / WordNet

      Microsoft Word - pp1404-lee.docx

      Add to Reading List

      Source URL: gdac.uqam.ca

      Language: English - Date: 2017-10-04 00:51:42
      18Software engineering / Computer programming / Computing / Compiler construction / Programming language implementation / Compiler optimizations / Object-oriented programming languages / C++ / Undefined behavior / LLVM / Optimizing compiler / Static single assignment form

      Taming Undefined Behavior in LLVM Juneyoung Lee Yoonseung Kim Youngju Song Chung-Kil Hur Seoul National University, Korea

      Add to Reading List

      Source URL: www.cs.utah.edu

      Language: English - Date: 2017-04-14 11:35:39
      19Cryptography / Computing / Transport Layer Security / Internet protocols / Cryptographic protocols / Internet Standards / Public-key cryptography / OCSP stapling / Public key certificate / Public key infrastructure / Online Certificate Status Protocol / Hypertext Transfer Protocol

      Towards Sustainable Evolution for the TLS Public-Key Infrastructure Taeho Lee Christos Pappas

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English
      20Computing / Network architecture / Information and communications technology / Internet architecture / Routing / Computer networking / Internet Standards / Internet protocols / Forwarding plane / Router / Packet loss / Hop

      The Case for In-Network Replay Suppression Taeho Lee∗ Christos Pappas∗ Adrian Perrig

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English
      UPDATE