On

Results: 1282475



#Item
461Concurrency control / Transaction processing / Computing / Data management / System software / Transactional memory / Benchmark / Lock / Parallel computing / Linearizability / Consistency model

ARCHITECTURES FOR TRANSACTIONAL MEMORY A DISSERTATION SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY

Add to Reading List

Source URL: www.austenmcdonald.com

Language: English - Date: 2016-01-26 12:43:51
462Capping

Star-Cap: Cluster Power Management Using Software-Only Models John D. Davis Suzanne Rivoire () Moisés Goldszmidt (Microsoft Research) ICPP Workshop on Power-aware Algorithms,

Add to Reading List

Source URL: rivoire.cs.sonoma.edu

Language: English - Date: 2017-05-29 18:44:40
    463Intellectual property law / Copyright law / Data / Copyright law of the United States / Copyright / Derivative work / Institute of Electrical and Electronics Engineers / Law / Author / Information / Copyright Act of Ghana / Authorship and ownership in copyright law in Canada

    IEEE COPYRIGHT LICENSE FORM FOR LIMITED USE WITH IEEE COMPUTER SOCIETY’S EXPERIMENTAL “DELAYED-OPEN ACCESS” MODEL TITLE OF WORK (hereinafter, "the Work"): AUTHOR(S): IEEE PUBLICATION TITLE: 2017 IEEE Symposium on S

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-03-16 07:17:53
    464Quantum information science / Theoretical computer science / Quantum mechanics / Quantum cryptography / Cryptography / Quantum computing / BB84 / Qubit / Quantum key distribution / Quantum information / Controlled NOT gate / Quantum money

    Lecture 8, Thurs Feb 9: More on Quantum Money, BB84 QKD Guest Lecture by Supartha Podder Continuation of Quantum Money Last time we discussed how classical money is copyable and described a scheme for making money uncopy

    Add to Reading List

    Source URL: www.scottaaronson.com

    Language: English - Date: 2018-08-26 18:22:42
    465Health / Medicine / RTT / Second plague pandemic / Veterinary medicine / Black Death / Epidemiology / Plague / Septicemic plague / Bubonic plague / Pneumonic plague / Yersinia pestis

    Nostradamus & The Plague by Robert A. Nelson Doctors are warning that the current outbreak of “Black Plague” on the island of Madagascar will continue to spread and worsen, and could become a global pandemic. No one

    Add to Reading List

    Source URL: www.rexresearch.com

    Language: English - Date: 2017-12-30 23:59:24
    466Computer programming / Software engineering / Mathematical logic / Formal methods / Predicate logic / Opaque predicate / Computability theory / Predicate / Satisfiability modulo theories / Stack / Disassembler / FO

    Backward-Bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes? Sébastien Bardin Robin David

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:28
    467Computational complexity theory / Mathematics / Theoretical computer science / Complexity classes / Analysis of algorithms / Quantum computing / Linear programming / Simplex algorithm / Quantum algorithm / P versus NP problem / Quantum supremacy / Time complexity

    THREE PUZZLES ON MATHEMATICS, COMPUTATION, AND GAMES GIL KALAI HEBREW UNIVERSITY OF JERUSALEM AND YALE UNIVERSITY Abstract. In this lecture I will talk about three mathematical puzzles involving mathematics and computati

    Add to Reading List

    Source URL: eta.impa.br

    Language: English - Date: 2018-07-28 17:09:47
    468Food and drink / Cuisine / Staple foods / World cuisine / Mediterranean cuisine / Vegan cuisine / Yogurt / Bread / Pasta / Paste / Soy milk / Table of food nutrients

    List of Acid/Alkali Forming Foods Here is a brief food table based on the information provided by Professor Jürgen Vormanne of the Institute for Prevention and Diet in Ismaning, Germany. Foods with a negative value exer

    Add to Reading List

    Source URL: alkaway.com

    Language: English - Date: 2017-12-05 00:34:58
    469Security engineering / Law / Cyberwarfare / Crime prevention / National security / Cybercrime / Security / Computer network security / Computer security / Internet privacy / Telecommunications (Interception and Access) Amendment (Data Retention) Act / Protecting Children from Internet Predators Act

    ACS submission on the Assistance and Access Bill 2018

    Add to Reading List

    Source URL: www.acs.org.au

    Language: English
    470Computing / Computer security / Internet security / Information Age / Information and communications technology / HackerOne / Computer viruses / Bug bounty program / Hacker culture / Security hacker / Hacker / Katie Moussouris

    ZOMATO’S HACKER-FOCUSED APPROACH TURNS THE TABLES ON SECURITY VULNERABILITIES Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and qualit

    Add to Reading List

    Source URL: www.hackerone.com

    Language: English - Date: 2018-08-21 12:07:31
    UPDATE