Randomization

Results: 457



#Item
221Statistics / Scientific method / Randomized controlled trial / Abhijit Banerjee / Causality / Randomization / Randomized experiment / Experiment / Mendelian randomization / Design of experiments / Science / Epidemiology

Public Disclosure Authorized Policy Research Working Paper Public Disclosure Authorized

Add to Reading List

Source URL: www-wds.worldbank.org

Language: English - Date: 2014-02-25 01:10:04
222Computer programming / Pointer / Dangling pointer / Stack buffer overflow / Memory safety / Address space layout randomization / Buffer overflow / C / Memory corruption / Computing / Software engineering / Software bugs

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: lenx.100871.net

Language: English - Date: 2013-03-11 18:00:21
223Statistical tests / Hardware verification languages / Randomness / Randomization / Resampling / E / Statistics / Design of experiments / Probability and statistics

Randomization Test used in DeWalt et alPlant Ecology Kyle Harms

Add to Reading List

Source URL: www.kharms.biology.lsu.edu

Language: English - Date: 2014-05-30 18:12:24
224Address space layout randomization / Hypervisor / Xen / Architecture of Windows NT / Hyper-V / Ring / Rootkit / System software / Software / Windows Server

POACHER TURNED GATEKEEPER: LESSONS LEARNED FROM EIGHT YEARS OF BREAKING HYPERVISORS Rafal Wojtczuk <> Agenda

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:03
225Information / Statistical theory / Evaluation methods / Rambhai / Quality / Experiment / Statistical inference / Randomization / Science / Statistics / Design of experiments

Version 2.0 Version 2.0 Version 2.0 Version 2.0 Version 2.0 Version 2.0

Add to Reading List

Source URL: new.censusatschool.org.nz

Language: English - Date: 2014-05-22 19:48:36
226Software bugs / Address space layout randomization / Malware / Pointer / Vulnerability / Duqu / Pwn2Own / Heap overflow / Stack buffer overflow / Computer security / Computing / Cyberwarfare

Ken  Johnson,  Ma,  Miller   Microso1  Security  Engineering  Center  (MSEC)       Black  Hat  USA  2012    

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-08-13 16:23:01
227Heap feng shui / Address space layout randomization / C dynamic memory allocation / Heap / Feng shui / Pointer / Pwn2Own / D-ary heap / New / Computing / Computer programming / Software engineering

The Art of Leaks: The Return of Heap Feng Shui Ga1ois @NSFOCUS Security Labs Agenda

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2014-03-19 04:38:32
228Statistical inference / Psychometrics / Statistical tests / Randomization / Random assignment / Statistical hypothesis testing / Null hypothesis / Resampling / Alternative hypothesis / Statistics / Design of experiments / Hypothesis testing

Microsoft Word - Budgett&Pfannkuch.docx

Add to Reading List

Source URL: new.censusatschool.org.nz

Language: English - Date: 2012-09-17 21:06:01
229C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / Software engineering / GADGET / MOV / Shellcode / NX bit / Computing / Software bugs / Computer architecture

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
230Information / Evaluation methods / Research / Data / Randomization / Experiment / Science / Design of experiments / Statistics

Microsoft Word - as91583.doc

Add to Reading List

Source URL: www.nzqa.govt.nz

Language: English - Date: 2012-12-05 22:05:06
UPDATE