On

Results: 1282475



#Item
511Cryptography / Computing / Computer security / Cybercrime / Password / Security / Challengeresponse authentication / Secure Shell / Passphrase / Telnet / Computer keyboard / Typing

Timing Analysis of Keystrokes and Timing Attacks on SSH Dawn Xiaodong Song David Wagner University of California, Berkeley Xuqing Tian

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
512College and university rankings / Times Higher Education World University Rankings / University of Crete / Education / University Ranking by Academic Performance / Higher Education in the Arab World

University of Crete holds its place The 2019 Times Higher Education (THE) World University Rankings, published on 26 September 2018, ranks University of Crete (UoCagain this year out of 1,258 institutions world

Add to Reading List

Source URL: www.en.uoc.gr

Language: English - Date: 2018-09-26 08:26:20
513Taxation in the United States / Internal Revenue Service / Tax / Government / Computer access control / Tax investigation / Electronic authentication / Treasury Inspector General for Tax Administration / Income tax in the United States / Multi-factor authentication / Preparer Tax Identification Number / Individual Taxpayer Identification Number

COMMITTEE ON WAYS AND MEANS, SUBCOMMITTEE ON OVERSIGHT U.S. HOUSE OF REPRESENTATIVES “The Internal Revenue Service’s Taxpayer Online Authentication Efforts”

Add to Reading List

Source URL: www.treasury.gov

Language: English - Date: 2018-09-28 11:35:23
514Law / Foreign relations / Government / Child safety / Family law / Abuse / International child abduction / Child custody / Hague Convention on the Civil Aspects of International Child Abduction / Child abduction / Parental child abduction / National Center for Missing and Exploited Children

Hague Convention on International Child Abduction

Add to Reading List

Source URL: www.loc.gov

Language: English - Date: 2015-07-01 17:34:35
515Sex and the law / British Board of Film Classification / Censorship / Human sexuality / Soho Square / Television in the United Kingdom / Internet censorship in the United Kingdom / Digital Economy Act / Internet pornography / 18 / Pornography / Section 63 of the Criminal Justice and Immigration Act

Guidance on Age-verification Arrangements Submitted to the Secretary of State pursuant to section 25 of the Digital Economy ActOctober 2018

Add to Reading List

Source URL: assets.documentcloud.org

Language: English - Date: 2018-10-18 22:11:22
516Computing / Concurrent computing / Cache coherency / Computer architecture / Transaction processing / Cache / Parallel computing / Concurrency control / CPU cache / MESI protocol / Cache coherence / Victim cache

Characterization of TCC on Chip-Multiprocessors Austen McDonald, JaeWoong Chung, Hassan Chafi, Chi Cao Minh, Brian D. Carlstrom Lance Hammond, Christos Kozyrakis, Kunle Olukotun Computer Systems Laboratory Stanford Unive

Add to Reading List

Source URL: www.austenmcdonald.com

Language: English - Date: 2016-01-26 12:43:51
517Numerical analysis / Mathematical analysis / Mathematical optimization / Generalized functions / Distribution / Functional analysis / Stochastic gradient descent / Gradient descent

On First-Order Meta-Learning Algorithms arXiv:1803.02999v3 [cs.LG] 22 Oct 2018 Alex Nichol and Joshua Achiam and John Schulman OpenAI

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-10-22 21:09:49
518Circuit complexity / NC / Price of anarchy / Nash equilibrium

Participation Incentives on a Wireless Random Access Erasure Collision Channel

Add to Reading List

Source URL: www.cs.drexel.edu

Language: English - Date: 2017-10-01 18:35:24
519

Fibbing in action: On-demand load-balancing for better video delivery † ‡ * *

Add to Reading List

Source URL: inl.info.ucl.ac.be

Language: English - Date: 2018-05-31 05:55:36
    520Binary trees / Computing / Computer programming / B-tree / Learning / Data types / Trie / B+ tree / Btrfs / R-tree / T-tree / Tree

    A Crash-Safe Key-Value Store Using Chained Copy-on-Write B-trees by Bruno Castro-Karney Supervised by Xi Wang

    Add to Reading List

    Source URL: unsat.cs.washington.edu

    Language: English - Date: 2018-08-21 17:45:06
    UPDATE