Matthias

Results: 3580



#Item
21Parallel computing / Computer programming / Application programming interfaces / IT infrastructure / Computing / Fortran / OpenMP / Thread

Runtime Correctness Checking for Emerging Programming Paradigms Joachim Protze (), Christian Terboven, Matthias S. Müller, Serge Petiton, Nahid Emad, Hitoshi Murai and Taisuke Boku RWTH Aachen U

Add to Reading List

Source URL: correctness-workshop.github.io

Language: English - Date: 2017-11-14 22:52:13
22Genetics / Biology / Epigenetics / DNA / Genomics / Molecular biology / Genetic mapping / DNA methylation / Bisulfite sequencing / Methylation / CpG site / Bayesian tool for methylation analysis

Identifying Personal DNA Methylation Profiles by Genotype Inference Michael Backes∗ , Pascal Berrang∗ , Matthias Bieg† , Roland Eils†‡ , Carl Herrmann†‡ , Mathias Humbert∗ , Irina Lehmann§ ∗ CISPA,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:30
23Cryptography / Post-quantum cryptography / Public-key cryptography / XMSS / Power analysis / Random number generation / Side-channel attack / Cryptographic hash function / Quantum cryptography / RSA / Digital signature / Pseudorandom number generator

Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer 16 April 2018 CRYPTACUS Training School,

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-09 08:49:55
24Type theory / Software engineering / Programming language theory / Computing / Scheme / System F / Type system / HindleyMilner type system / Racket / Boolean data type / Macro / Typing environment

Higher-Order and Symbolic Computation manuscript No. (will be inserted by the editor) The Design and Implementation of Typed Scheme: From Scripts to Programs? Sam Tobin-Hochstadt · Matthias Felleisen

Add to Reading List

Source URL: homes.sice.indiana.edu

Language: English - Date: 2013-08-15 14:47:07
25Cryptography / Post-quantum cryptography / Trusted Computing / Public-key cryptography / Quantum cryptography / Key size / Advanced Encryption Standard process

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-02 10:21:47
26Media access control / IEEE 802 / Computing / Data transmission / Ethernet / Wireless networking / IEEE 802.15.4 / Carrier-sense multiple access with collision avoidance / Carrier-sense multiple access / Medium access control / Zigbee / Exponential backoff

Probabilistic Model Checking of Contention Resolution in the IEEELow-Rate Wireless Personal Area Network Protocol Matthias Fruth School of Computer Science, University of Birmingham, Edgbaston, Birmingham, B15

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2007-06-27 11:48:43
27Cryptography / Public-key cryptography / Post-quantum cryptography / Hash-based cryptography / Hashing / Merkle signature scheme / Digital signature / Merkle tree / Cryptographic hash function / RSA / Hash function / Quantum digital signature

Practical Fault Injection Attacks on SPHINCS Aymeric Genêt1,2 , Matthias J. Kannwischer3 , Hervé Pelletier2 , and Andrew McLauchlan2 ? 1 3

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-07-10 06:41:12
28Software engineering / Programming language theory / Computing / Type theory / Data types / Functional languages / Type systems / Lambda calculus / HindleyMilner type system / Haskell / Agda / Dependent type

Suggesting Valid Hole Fits for Typed-Holes (Experience Report) Matthías Páll Gissurarson Chalmers University of Technology, Sweden

Add to Reading List

Source URL: mpg.is

Language: English - Date: 2018-08-05 06:01:43
29Global Positioning System / Avionics / Finance / Economy / Money / Computer network security / Spoofing attack / Navigation / FLARM / Automatic dependent surveillance  broadcast / GPS navigation device / GPS signals

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Kai Jansen∗ , Matthias Sch¨afer† , Daniel Moser‡ , Vincent Lenders§ , Christina P¨opper¶ and Jens Schmitt† ∗ Ruhr-Universi

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-01-11 04:46:53
30

PDF Document

Add to Reading List

Source URL: matthias.hullin.net

- Date: 2013-11-05 04:13:10
    UPDATE