Random-access machine

Results: 56



#Item
21Computation-Trace Indistinguishability Obfuscation and its Applications Yu-Chi Chen∗ Sherman S. M. Chow† Wei-Kai Lin¶

Computation-Trace Indistinguishability Obfuscation and its Applications Yu-Chi Chen∗ Sherman S. M. Chow† Wei-Kai Lin¶

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 11:40:02
22The tree machine? Arnaud Spiwack MINES ParisTech   Abstract. A variant of Turing machines is introduced where the tape

The tree machine? Arnaud Spiwack MINES ParisTech Abstract. A variant of Turing machines is introduced where the tape

Add to Reading List

Source URL: www.cri.ensmp.fr

Language: English - Date: 2015-02-19 09:03:36
23Secret Shared Random Access Machine (Preliminary Version) Shlomi Dolev∗ Yin Li† March 28, 2015  Abstract

Secret Shared Random Access Machine (Preliminary Version) Shlomi Dolev∗ Yin Li† March 28, 2015 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-28 08:21:27
24Characterising Effective Resource Analyses for Parallel and Distributed Coordination P. W. Trinder1 , M. I. Cole2 , H-W. Loidl1 , and G. J. Michaelson1 1  School of Mathematical and Computer Sciences,

Characterising Effective Resource Analyses for Parallel and Distributed Coordination P. W. Trinder1 , M. I. Cole2 , H-W. Loidl1 , and G. J. Michaelson1 1 School of Mathematical and Computer Sciences,

Add to Reading List

Source URL: www.macs.hw.ac.uk

Language: English - Date: 2010-04-06 09:34:25
25Using Memory Errors to Attack a Virtual Machine Sudhakar Govindavajhala ∗ Andrew W. Appel Princeton University {sudhakar,appel}@cs.princeton.edu Abstract

Using Memory Errors to Attack a Virtual Machine Sudhakar Govindavajhala ∗ Andrew W. Appel Princeton University {sudhakar,appel}@cs.princeton.edu Abstract

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2003-03-06 09:41:50
26ON PURPOSE AN ENQUIRY INTO THE POSSIBLE ROLES OF THE COMPUTER IN ART HAROLD COHEN

ON PURPOSE AN ENQUIRY INTO THE POSSIBLE ROLES OF THE COMPUTER IN ART HAROLD COHEN

Add to Reading List

Source URL: www.aaronshome.com

Language: English - Date: 2014-09-12 15:26:30
27Microsoft Word - IBS[removed]AI NNets, Gene, NLP.doc

Microsoft Word - IBS[removed]AI NNets, Gene, NLP.doc

Add to Reading List

Source URL: www.foibg.com

Language: English - Date: 2015-02-02 08:45:45
28Parallel Processing Letters cfWorld Scientific Publishing Company FAILURE-SENSITIVE ANALYSIS OF PARALLEL ALGORITHMS WITH CONTROLLED MEMORY ACCESS CONCURRENCY∗ CHRYSSIS GEORGIOU

Parallel Processing Letters cfWorld Scientific Publishing Company FAILURE-SENSITIVE ANALYSIS OF PARALLEL ALGORITHMS WITH CONTROLLED MEMORY ACCESS CONCURRENCY∗ CHRYSSIS GEORGIOU

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2007-11-27 05:21:39
29Second Attempt to Build a Model of the Tick-Tack-Toe Game Dimiter Dobrev Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, “Acad. G. Bonchev” Str., Bl. 8,

Second Attempt to Build a Model of the Tick-Tack-Toe Game Dimiter Dobrev Institute of Mathematics and Informatics, Bulgarian Academy of Sciences, “Acad. G. Bonchev” Str., Bl. 8,

Add to Reading List

Source URL: www.dobrev.com

Language: English - Date: 2008-01-11 14:21:12
30Alias Analysis for Assembly  David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R

Alias Analysis for Assembly David Brumley and James Newsome December 15, 2006 CMU-CS-06-180R

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01