SWS

Results: 2096



#Item
351Compiler construction / Procedural programming languages / Parsing / Control characters / Compiling tools / Delete character / Recursive descent parser / LR parser / Parser combinator / Lexical analysis / Forth / Scheme

Modular Rollback through Control Logging A Pair of Twin Functional Pearls Olin Shivers Aaron Turon

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2011-07-18 13:38:38
352Fog / Psychrometrics

Champaign-Urbana Weather Observations

Add to Reading List

Source URL: www.sws.uiuc.edu

Language: English - Date: 2012-04-02 17:24:18
353Real-time computing / Time / Real-time operating systems / Embedded operating systems

OSPERT 2015 Program 8:00 – 9:00 9:00 – 10:30 Tuesday, July 7th 2015 Registration

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2016-07-14 16:23:27
354

Anhang I zur Studienordnung Rechtswissenschaft (2015): Studienplan (für Studierende, die ihr Studium zum WS aufnehmen) Legende: HA = Hausarbeit; K = Klausur; SWS = Semesterwochenstunden VL = Vorlesung; AG = Arbeitsgemei

Add to Reading List

Source URL: www.jura.uni-bonn.de

Language: German - Date: 2015-11-25 04:27:34
    355Computer network security / Reputation management / Sybil attack / Yelp / Sibyl / Sybil

    Strength in Numbers: Robust Tamper Detection in Crowd Computations Bimal Viswanath MPI-SWS

    Add to Reading List

    Source URL: www.mpi-sws.org

    Language: English - Date: 2015-09-11 18:12:25
    356Hydraulic engineering / Hydrology / Bodies of water / Hydrogeology / Water wells / Aquifer / Groundwater

    Fact Sheet 2 from Contract ReportGroundwater Availability in Northeastern Illinois from Deep Sandstone Aquifers Devin H. Mannix, Daniel B. Abrams, Daniel R. Hadley, George S. Roadcap, Walton R. Kelly Desaturat

    Add to Reading List

    Source URL: www.sws.uiuc.edu

    Language: English - Date: 2016-02-12 13:26:16
    357Cybercrime / Twitter / Phishing / Identity theft / Klout / Social engineering / Spamming / Impersonator / Sybil attack / Internet bot

    The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks Oana Goga Giridhari Venkatadri

    Add to Reading List

    Source URL: www.mpi-sws.org

    Language: English - Date: 2015-09-11 04:02:46
    358Learning / Prevention / Safety / Internet privacy / Security / Privacy / Facial recognition system / Bystander / Surveillance

    I-Pic: A Platform for Privacy-Compliant Image Capture Paarijaat Aditya, Rijurekha Sen and Peter Druschel Max Planck Institute for Software Systems (MPI-SWS) Seong Joon Oh, Rodrigo Benenson, Mario Fritz and Bernt Schiele

    Add to Reading List

    Source URL: scalable.mpi-inf.mpg.de

    Language: English - Date: 2016-05-19 15:03:10
    359

    PROFESSIONAL WETLAND SCIENTIST E-LETTER Volume 7, Issue 1, 2014 PRESIDENT’S CORNER Greetings from the SWS Professional Certification Program! As your new President, I’m pleased to report that SWSPCP is in great shape

    Add to Reading List

    Source URL: www.wetlandcert.org

    Language: English - Date: 2014-07-22 16:32:31
      360

      Master Thesis Ressourcen-Reservations-System (RRS) für das Gymnasium Neufeld Bern Software Requirements Specification

      Add to Reading List

      Source URL: static.sws.bfh.ch

      Language: German - Date: 2008-05-07 10:27:27
        UPDATE