Protocol

Results: 55328



#Item
301

Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2011-06-20 08:16:21
    302

    Inferring Protocol State Machine from Network Traces: A Probabilistic Approach⋆ Yipeng Wang13 , Zhibin Zhang1 , Danfeng (Daphne) Yao2 , Buyun Qu13 , and Li Guo1 1

    Add to Reading List

    Source URL: people.cs.vt.edu

    Language: English - Date: 2011-04-08 11:29:00
      303

      Integrity and Standards Unit (ISU) Complaint Handling Protocol for interacting with the ISU For ISU clients

      Add to Reading List

      Source URL: complaints.curtin.edu.au

      Language: English - Date: 2018-07-31 02:28:01
        304

        Microsoft Word - Core D Procedure Protocol ATP, Kdo2 Lipid A Treatmentdoc

        Add to Reading List

        Source URL: www.lipidmaps.org

        Language: English - Date: 2018-06-07 06:17:43
          305

          Florida Department of Transportation (FDOT) Actuated Traffic Signal Controller (ASC) Management Information Base (MIB) and National Transportation Communications for ITS (Intelligent Transportation Systems) Protocol (NTC

          Add to Reading List

          Source URL: eng.fsu.edu

          Language: English - Date: 2009-06-29 14:42:08
            306

            Increasing Reality for DTN Protocol Simulations Ari Ker¨anen and J¨org Ott Helsinki University of Technology, Networking Laboratory {akeranen,jo}@netlab.tkk.fi Abstract— Powerful personal devices provide the basis f

            Add to Reading List

            Source URL: www.netlab.tkk.fi

            Language: English - Date: 2007-11-22 07:55:20
              307

              Blockchain-based smart-contract protocol Humans make financial decisions influenced by emotions. A chain of wrong decisions while choosing an asset to open for a long or short position or a strategy that is not suitable

              Add to Reading List

              Source URL: hyperquant.net

              Language: English - Date: 2018-08-09 12:38:46
                308

                Ancillary Study Proposal Review Process Summary Before ancillary studies that are not an integral part of a protocol can be endorsed by the BMT CTN, proposals must go through the review process delineated below and be ap

                Add to Reading List

                Source URL: web.emmes.com

                Language: English - Date: 2016-08-29 11:08:38
                  309

                  Annex 2: Protocol Implementation Conformance Statement (PICS) PICS related to performanceThe device tested is a G3-PLC FCC 1-phase meter. Operating voltage applied for certification testing was 230V/50Hz. The ce

                  Add to Reading List

                  Source URL: www.g3-plc.com

                  - Date: 2018-01-25 01:02:11
                    310

                    Refund attacks on Bitcoin’s Payment Protocol Patrick McCorry, Siamak F. Shahandashti, Feng Hao School of Computing Science, Newcastle University UK (patrick.mccorry, siamak.shahandashti, feng.hao)@ncl.ac.uk Abstract.

                    Add to Reading List

                    Source URL: tokyo2018.scalingbitcoin.org

                    Language: English - Date: 2016-09-30 04:48:05
                      UPDATE