School of Engineering

Results: 8520



#Item
1Cryptography / Computational complexity theory / Complexity classes / Interactive proof system / Zero-knowledge proof / NP / Probabilistically checkable proof / IP / Soundness / Commitment scheme / NEXPTIME / P versus NP problem

The Complexity of Zero Knowledge Salil Vadhan∗ School of Engineering and Applied Sciences Harvard University Cambridge, MA 02138

Add to Reading List

Source URL: people.seas.harvard.edu

Language: English - Date: 2010-03-21 22:20:21
2Computing / Software engineering / Notation / Systems engineering / Automated planning and scheduling / Planning Domain Definition Language / Conceptual model / Object Process Methodology / Prolog

Learning Static Constraints for Domain Modeling from Training Plans Rabia Jilani School of Computing and Engineering University of Huddersfield United Kingdom

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-09 08:09:30
3Statistical natural language processing / World Wide Web / Digital media / Internet culture / Subreddits / Crowdsourcing / Reddit / Collaboration / /r/IAmA / Oriented FAST and rotated BRIEF / Topic model / Select

Learning Linguistic Descriptors of User Roles in Online Communities Alex Wang1 , William L. Hamilton2 , Jure Leskovec2 1 School of Engineering and Applied Sciences, Harvard University, Cambridge MA, Computer Scie

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2016-10-27 12:19:11
4Cryptography / Obfuscation / Computer security / Password / Security / Cyberwarfare / Salt / Identity management / Password policy / Password fatigue

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
5Security / Security breaches / Prevention / Ransomware / Cybercrime / Malware / Locky / Computer security

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
6Energy / Universe / Energy conversion / Renewable energy technology / Wireless networking / Smart grid / Energy development / Ocean thermal energy conversion / Desalination / Energy technology / Wireless sensor network / Energy storage

Research Centres & Supervisors School of Engineering

Add to Reading List

Source URL: www.ecu.edu.au

Language: English - Date: 2018-08-20 03:59:08
7

Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries Shumo Chu, Brendan Murphy, Jared Roesch, Alvin Cheung, Dan Suciu Paul G. Allen School of Computer Science and Engineering University

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2018-07-28 03:46:38
    8

    Georgios Fainekos School of Computing, Informatics and Decision Systems Engineering, Arizona State University. Office address: 660 W 6th St, STE, Tempe, AZweb: http://www.public.asu.edu/~gfaineko/, email: f

    Add to Reading List

    Source URL: www.public.asu.edu

    Language: English - Date: 2018-02-09 03:36:24
      9Computer network security / Computing / Cyberwarfare / Multi-agent systems / Spamming / Cybercrime / Botnets / Intrusion detection system / Server / Cluster analysis / Internet bot / Computer security

      Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-11 13:01:38
      10Humancomputer interaction / Reality / Computing / User interface techniques / Augmented reality / Mixed reality / Virtual reality / Multimodal interaction / Microsoft HoloLens / Head-mounted display / Internet privacy / JavaScript

      1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 16:01:40
      UPDATE