Org

Results: 4040769



#Item
821Complexity classes / Cryptography / Control flow / Eval / Computing / Verifiable secret sharing / Verifiable random function / Digital signature / NP / NC

Verifiable Delay Functions Dan Boneh1 , Joseph Bonneau2 , Benedikt B¨ unz1 , and Ben Fisch1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-08-21 23:38:12
822Information and communications technology / Computing / Internet / Internet privacy / Computer networking / File sharing / Transport Layer Security / Network performance / Proxy server / Computer network / Internet censorship circumvention / Transmission Control Protocol

An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

Add to Reading List

Source URL: www.usenix.org

Language: English
823Religious demographics

1 PEW RESEARCH CENTER 2017 PEW RESEARCH CENTER’S AMERICAN TRENDS PANEL (ATP) WAVE 30 December FINAL TOPLINE

Add to Reading List

Source URL: www.pewforum.org

Language: English - Date: 2018-09-13 15:12:09
    824Crowdsourcing / Human-based computation / Social information processing / Web services / Computing / Collaboration / Collective intelligence / Amazon Mechanical Turk / Ethereum / Figure Eight Inc.

    Draft VersionGems Protocol Decentralized Mechanical Turk powered by Ethereum Gems is a protocol for contracting workers to perform micro tasks. Workers stake tokens in order to prove validity of their tasks and ea

    Add to Reading List

    Source URL: gems.org

    Language: English - Date: 2017-11-07 11:45:03
    825Game artificial intelligence / Routing algorithms / Computer programming / Computing / Mathematics / Automated planning and scheduling / Theoretical computer science / Macro / Satisficing / A* search algorithm / Planning Domain Definition Language / Heuristic

    Exploiting Search Space Structure in Classical Planning: Analyses and Algorithms (Dissertation Abstract) Masataro Asai Graduate School of Arts and Sciences University of Tokyo

    Add to Reading List

    Source URL: icaps16.icaps-conference.org

    Language: English - Date: 2016-06-09 08:09:18
    826Economy / Finance / Money / Investment / Funds / Finance in China / European Union directives / Undertakings for Collective Investment in Transferable Securities Directive / Qualified Domestic Institutional Investor / Investment fund / Offshore fund / Hedge fund

    ANNUAL REPORT 2009 MALTA FUNDS INDUSTRY ASSOCIATION .m.f.i.a.

    Add to Reading List

    Source URL: mfia.org.mt

    Language: English - Date: 2012-02-22 11:36:45
    827

    The State of Internet Censorship in Egypt A research study by: Open Observatory of Network Interference (OONI) Association for Freedom of Thought and Expression (AFTE)

    Add to Reading List

    Source URL: ooni.torproject.org

    Language: Arabic - Date: 2018-10-19 07:05:34
      828

      arXiv:1402.3401v5 [cs.CY] 5 NovCensorship in the Wild: Analyzing Internet Filtering in Syria Abdelberi Chaabane Terence Chen

      Add to Reading List

      Source URL: arxiv.org

      Language: English - Date: 2014-11-05 22:13:23
        829Disaster preparedness / Emergency management / Humanitarian aid / Occupational safety and health / Commission on Accreditation for Law Enforcement Agencies

        Media Release For immediate release: April 19, 2018 Contact: Nicole Ishmael, Highest Honor for Emergency Management Awarded to Nine Programs Newport, RI. – Congratulations to the following Emergency Mana

        Add to Reading List

        Source URL: www.emap.org

        Language: English - Date: 2018-04-19 13:54:10
        UPDATE