Paper

Results: 146959



#Item
11Airgead Coin White Paper 1  Table of Contents

Airgead Coin White Paper 1 Table of Contents

Add to Reading List

Source URL: www.airgeadcoin.io

Language: English - Date: 2018-09-07 11:10:35
12A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

Add to Reading List

Source URL: www.neven.org

Language: English - Date: 2012-04-18 06:07:38
13ULedger Technical Approach Technical White Paper Taulant Ramabaja, Josh McIver, Pete Anewalt, Dave Otander November, 2017

ULedger Technical Approach Technical White Paper Taulant Ramabaja, Josh McIver, Pete Anewalt, Dave Otander November, 2017

Add to Reading List

Source URL: www.uledger.co

Language: English - Date: 2018-02-19 17:17:49
14Trip New Token Mechanism Business Model Pioneer (Blockchain-based Trip Platform)  White Paper

Trip New Token Mechanism Business Model Pioneer (Blockchain-based Trip Platform) White Paper

Add to Reading List

Source URL: trip.org

Language: English - Date: 2018-06-22 08:11:54
15River Publishers Guidelines for Authors Submitting Journal Paper Action points before submission of final manuscript. Please use this list to ensure that

River Publishers Guidelines for Authors Submitting Journal Paper Action points before submission of final manuscript. Please use this list to ensure that

Add to Reading List

Source URL: www.riverpublishers.com

Language: English - Date: 2018-10-18 08:30:00
16This paper appears at the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDIDetecting and Defending Against Third-Party Tracking on the Web Franziska Roesner, Tadayoshi Kohno, and David We

This paper appears at the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDIDetecting and Defending Against Third-Party Tracking on the Web Franziska Roesner, Tadayoshi Kohno, and David We

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-07 03:28:10
    17Published as a conference paper at ICLRM AKING N EURAL P ROGRAMMING A RCHITECTURES G ENERALIZE VIA R ECURSION Jonathon Cai, Richard Shin, Dawn Song Department of Computer Science

    Published as a conference paper at ICLRM AKING N EURAL P ROGRAMMING A RCHITECTURES G ENERALIZE VIA R ECURSION Jonathon Cai, Richard Shin, Dawn Song Department of Computer Science

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2017-03-10 19:56:16
    18Quantitative Stochastic Models in the Verification and Design of Software Systems  IMPORTANT DATES. Submission of papers: Extended) Notification of acceptance: Camera-ready paper:

    Quantitative Stochastic Models in the Verification and Design of Software Systems IMPORTANT DATES. Submission of papers: Extended) Notification of acceptance: Camera-ready paper:

    Add to Reading List

    Source URL: deepse.dei.polimi.it

    Language: English - Date: 2015-03-19 06:25:46
    19Paper Title (use style: paper title)

    Paper Title (use style: paper title)

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-12 13:30:48
    201. Of the Nature of Flatland. I call our world Flatland, not because we call it so, but to make its nature clearer to you, my happy readers, who are privileged to live in Space. Imagine a vast sheet of paper on which str

    1. Of the Nature of Flatland. I call our world Flatland, not because we call it so, but to make its nature clearer to you, my happy readers, who are privileged to live in Space. Imagine a vast sheet of paper on which str

    Add to Reading List

    Source URL: thelocalyarn.com

    Language: English - Date: 2016-10-05 09:28:30