School of Computer Science

Results: 3584



#Item
101

Sharing Resources Between AES and the SHA-3 Second Round Candidates Fugue and Grøstl Kimmo Järvinen Department of Information and Computer Science Aalto University, School of Science and Technology

Add to Reading List

Source URL: users.ics.aalto.fi

Language: English - Date: 2010-08-15 15:20:50
    102

    Value Pursuit Iteration Amir-massoud Farahmand∗ Doina Precup † School of Computer Science, McGill University, Montreal, Canada Abstract

    Add to Reading List

    Source URL: www.sologen.net

    Language: English - Date: 2012-11-24 13:28:25
      103

      A Malware-Tolerant, Self-Healing Industrial Control System Framework Michael Denzel, Mark Ryan, and Eike Ritter University of Birmingham, School of Computer Science, B15 2TT Birmingham, United Kingdom {m.denzel,m.d.ryan,

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      Language: English - Date: 2017-05-30 06:54:48
        104

        Rigorous Graphical Modelling of Movement in Collective Adaptive Systems N. Zo´ n(B) , S. Gilmore, and J. Hillston Laboratory for Foundations of Computer Science, School of Informatics, University of Edinburgh, Edinburgh

        Add to Reading List

        Source URL: blog.inf.ed.ac.uk

        Language: English - Date: 2017-02-23 05:37:24
          105

          Feature integration using a feature construct 1 Malte Plath and Mark Ryan School of Computer Science, University of Birmingham, Birmingham B15 2TT, UK,

          Add to Reading List

          Source URL: www.cs.bham.ac.uk.

          Language: English - Date: 2009-02-25 10:35:14
            106

            Carnegie Mellon School of Computer Science Scheme Flow Analysis Note

            Add to Reading List

            Source URL: repository.readscheme.org

            Language: English - Date: 2010-10-22 08:05:09
              107

              Reachable Subwebs for Traversal-Based Query Execution Olaf Hartig M. Tamer Özsu Cheriton School of Computer Science

              Add to Reading List

              Source URL: olafhartig.de

              Language: English - Date: 2015-12-04 15:53:21
                108

                Privacy-supporting cloud-based conference systems: protocol and verification Myrto Arapinis, Sergiu Bursuc, Mark Ryan School of Computer Science, University of Birmingham Security of cloud computing

                Add to Reading List

                Source URL: www.cs.bham.ac.uk

                Language: English - Date: 2011-06-20 08:16:21
                  109

                  Expediting the Digital Forensic Process through a Deduplicated Framework Xiaoyu Du, Mark Scanlon School of Computer Science, University College Dublin, Ireland. ,

                  Add to Reading List

                  Source URL: forensicsandsecurity.com

                  Language: English - Date: 2017-07-23 18:12:37
                    110

                    DEMS: A Data Mining Based Technique to Handle Missing Data in Mobile Sensor Network Applications Le Gruenwald, Md. Shiblee Sadik, Rahul Shukla, Hanqing Yang School of Computer Science University of Oklahoma Norman, Oklah

                    Add to Reading List

                    Source URL: www.cs.ucy.ac.cy

                    Language: English - Date: 2010-09-29 03:22:34
                      UPDATE