Nicholas

Results: 5905



#Item
831Railway stations / Railway platform

Modelling of train-induced pedestrian flows in railway stations Nicholas Molyneaux Flurin Hänseler Michel Bierlaire PRELIMINARY DRAFT

Add to Reading List

Source URL: www.strc.ch

Language: English - Date: 2014-05-06 07:56:07
832

FOR IMMEDIATE RELEASE MEDIA CONTACT Nicholas Weist, Creative Timex 205

Add to Reading List

Source URL: creativetime.org

Language: English - Date: 2015-08-26 20:17:56
    833

    S T A T I S T I C A L C O R N E R Risk Factors, Confounding, and the Illusion of Statistical Control NICHOLAS J. S. CHRISTENFELD, PHD, RICHARD P. SLOAN, PHD, DOUGLAS CARROLL, PHD,

    Add to Reading List

    Source URL: psy2.ucsd.edu

    Language: English - Date: 2005-03-30 11:45:52
      834

      More with Less: Lowering User Burden in Mobile Crowdsourcing through Compressive Sensing Liwen Xu† , Xiaohong Hao† , Nicholas D. Lane‡ , Xin Liu∗ , Thomas Moscibroda./ † Tsinghua University, ‡ Bell Labs, ∗

      Add to Reading List

      Source URL: niclane.org

      Language: English - Date: 2015-08-06 10:08:38
        835

        Slip OpUNITED STATES COURT OF INTERNATIONAL TRADE COMPOSITE TECHNOLOGY INTERNATIONAL, INC., Before: Nicholas Tsoucalas, Senior Judge

        Add to Reading List

        Source URL: www.cit.uscourts.gov

        Language: English - Date: 2015-09-28 13:34:15
          836Network performance / Computing / Network management / Internet security / System software / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol

          Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

          Add to Reading List

          Source URL: icir.org

          Language: English - Date: 2015-04-22 12:30:04
          837Cyberwarfare / Internet censorship in China / Computing / Denial-of-service attacks / Internet activism / Human rights in China / Internet in China / Cyberspace / GreatFire / Baidu / Denial-of-service attack / GFW

          An Analysis of China’s “Great Cannon” Bill Marczak Nicholas Weaver Jakub Dalek Roya Ensafi UC Berkeley, Citizen Lab

          Add to Reading List

          Source URL: www.usenix.org

          Language: English
          838Computing / Internet protocols / Network architecture / Computer network security / Cyberwarfare / Transmission Control Protocol / HTTP cookie / Port / Network packet / Firewall / Network socket / Application layer

          Protocol-Independent Adaptive Replay of Application Dialog Weidong Cui† , Vern Paxson‡ , Nicholas C. Weaver‡ , Randy H. Katz† † University of California, Berkeley, CA ‡ International Computer Science Institut

          Add to Reading List

          Source URL: www1.icsi.berkeley.edu

          Language: English - Date: 2012-09-26 16:43:00
          839

          Prime: A Framework for Co-located Multi-Device Apps David Chu† Zengbin Zhang‡ Alec Wolman† Nicholas Lane † ‡  Microsoft Research

          Add to Reading List

          Source URL: niclane.org

          Language: English - Date: 2015-08-06 10:08:50
            840Computer security / Cyberwarfare / Computing / Software bugs / Computer worms / Computer network security / Witty / Hacking / Software testing / Buffer overflow / Stack buffer overflow / SQL Slammer

            reflections on witty by Nicholas Weaver Nicholas Weaver is a postdoctoral researcher at the

            Add to Reading List

            Source URL: www1.icsi.berkeley.edu

            Language: English - Date: 2012-09-26 16:43:03
            UPDATE