Path

Results: 13948



#Item
1Cryptocurrencies / Blockchains / Alternative currencies / Concurrent computing / Economy / Computing / Decentralization / Cross-platform software / Bitcoin / Hyperledger / Smart contract / Ethereum

Top Ten Obstacles along Distributed Ledgers Path to Adoption Top Ten Obstacles along Distributed Ledgers Path to Adoption

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
2Law firm / Practice of law

Member Spotlight: Dr. Jana Schott A Boutique Path to New Beginnings Dr Jana Schott is one of the founding partners

Add to Reading List

Source URL: www.irglobal.com

Language: English - Date: 2018-08-02 08:22:42
3Internet / Computing / Cyberwarfare / Internet security / Computer network security / Internet Standards / Internet protocols / Transmission Control Protocol / Denial-of-service attack / TCP reset attack / IP address spoofing / Internet protocol suite

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-22 02:35:33
4Health effects of tobacco / Tobacco / Human behavior / Health / Smoking / Tobacco smoking / Youth smoking / Nicotine dependence / Electronic cigarette / Tobacco control / Cigarette / Cigar

Microsoft Word - The Path to Addiction Starts Earlydocx

Add to Reading List

Source URL: www.tobaccofreekids.org

Language: English - Date: 2018-10-09 15:15:54
5Web browsers / System software / Software / Tab / Mylyn / Computing

Path Exploration during Code Navigation by Kaitlin Duck Sherwood B.Sc., University of Illinois at Urbana-Champaign, 1984 M.Sc., University of Illinois at Urbana-Champaign, 1996

Add to Reading List

Source URL: webfoot.com

Language: English - Date: 2008-08-20 20:37:11
6Temporal logic / Algebraic structures / Mathematics / Logic / Metaphysics / Linear temporal logic / Logic in computer science / Computation tree logic / Non-classical logic / Model checking / Many-valued logic / Lattice

Temporal Logic Control under Incomplete or Conflicting Information Georgios Fainekos, and Herbert G. Tanner Abstract— Temporal logic control methods have provided a viable path towards solving the single- and multi-rob

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2018-02-08 16:28:11
7Computing / Routing / Network architecture / Data transmission / Wireless networking / Internet architecture / Packet forwarding / Internet Protocol / Onion routing / Dynamic Source Routing / MORE protocol

Proceedings on Privacy Enhancing Technologies ; ):1–18 Chen Chen* and Adrian Perrig Keywords: Anonymity, path-hidden protocols DOI Editor to enter DOI

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
8Networks / Network theory / Graph theory / Graphical models / Distributed data storage / Binary trees

Accurate Path-based Methods for Influence Maximization in Social Networks Yun-Yong Ko Dong-Kyu Chae

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:46:11
9Computing / Network architecture / Data transmission / Internet Standards / Internet protocols / Computer networking / Network performance / Units of information / Transmission Control Protocol / QUIC / Network address translation / User Datagram Protocol

A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols Mirja K¨uhlewind∗ , Tobias B¨uhler∗ , Brian Trammell∗ , Stephan Neuhaus† , Roman M¨untener† , and Gorry Fairhurst‡ ∗ ETH

Add to Reading List

Source URL: nsg.ee.ethz.ch

Language: English - Date: 2017-11-30 09:02:54
10Type theory / Software engineering / Computing / Computer programming / Data types / Object-oriented programming / Formal methods / Polymorphism / Subtyping / Type system / Inheritance / Refinement

Foundations of Path-Dependent Types Nada Amin∗ † Tiark Rompf †∗

Add to Reading List

Source URL: lampwww.epfl.ch

Language: English - Date: 2014-09-01 05:42:20
UPDATE