Nicholas

Results: 5905



#Item
881

The Review of Economic Studies Ltd. Alternative Theories of Distribution Author(s): Nicholas Kaldor Source: The Review of Economic Studies, Vol. 23, No), ppPublished by: The Review of Economic S

Add to Reading List

Source URL: piketty.pse.ens.fr

Language: English - Date: 2011-12-05 09:09:05
    882

    How Much Anonymity does Network Latency Leak? Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin University of Minnesota 200 Union St SE Minneapolis, MNUSA

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2007-08-07 14:50:48
      883

      The Stuckists estAn open letter to Sir Nicholas Serota

      Add to Reading List

      Source URL: www.stuckism.com

      Language: English - Date: 2011-03-03 14:54:01
        884

        cmind-py: A robust set of processing pipelines for pediatric fMRI Gregory R. Lee1,3, Akila Rajagopal1, Nicholas Felicelli2, Andrew Rupert2, Michael Wagner2,3, Scott Holland1,3 and the CMIND Authorship Consortium 1Departm

        Add to Reading List

        Source URL: www.pacificrimneuroimaging.net

        Language: English - Date: 2014-10-08 17:23:03
          885Government / Parliamentary procedure / United States Senate / Senate of Canada / Nicholas Burbules / Senate of Liberia / Committee / Politics / Academia

          Page 1 of 2 Senate Minutes April 20, 2015 APPROVED BY SENATE

          Add to Reading List

          Source URL: www.senate.illinois.edu

          Language: English - Date: 2015-09-30 11:42:30
          886

          Nicholas Beauchamp Assistant Professor Department of Political Science Northeastern University 301 Meserve Hall Boston, MA 02115, USA

          Add to Reading List

          Source URL: nickbeauchamp.com

          Language: English - Date: 2014-02-10 22:00:13
            887Cryptography / Spamming / Key management / Public-key cryptography / Computer security / Spam filtering / Password / Whitelist / Persona / Key / Email client / Phishing

            The Strengths of Weaker Identities: Opportunistic Personas∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

            Add to Reading List

            Source URL: www1.icsi.berkeley.edu

            Language: English - Date: 2012-09-26 16:43:02
            888

            Combining Theory Generation and Model Checking for Security Protocol Analysis Nicholas J. Hopper Sanjit A. Seshia January 2000

            Add to Reading List

            Source URL: reports-archive.adm.cs.cmu.edu

            Language: English - Date: 2000-02-21 17:21:30
              889

              Efficient Private Proximity Testing with GSM Location Sketches Zi Lin, Denis Foo Kune, and Nicholas Hopper Computer Science & Engineering, University of Minnesota, Minneapolis, MNlin, foo,

              Add to Reading List

              Source URL: fc12.ifca.ai

              Language: English - Date: 2012-02-18 14:33:41
                890

                Toward a theory of Steganography Nicholas J. Hopper CMU-CSJuly 2004

                Add to Reading List

                Source URL: reports-archive.adm.cs.cmu.edu

                Language: English - Date: 2004-08-12 18:12:57
                  UPDATE