Stephen

Results: 18079



#Item
291

BEADED LIZARDS The Beaded Lizard is one of only two venomous lizards in the world. But it’s not as bad as its reputation suggests, says Stephen L. Angeli. Deep down in Mexico, in the heart

Add to Reading List

Source URL: www.helodermahorridum.com

Language: English - Date: 2011-03-09 12:07:27
    292

    Checking Concise Specifications for Multithreaded Software Stephen N. Freund1 and Shaz Qadeer2 1 Department of Computer Science, Williams College, Williamstown, MA

    Add to Reading List

    Source URL: dept.cs.williams.edu

    Language: English - Date: 2018-08-12 09:37:26
      293

      Theoretical Computer Science – 183 www.elsevier.com/locate/tcs Modular verification of multithreaded programs Cormac Flanagana,∗,1 , Stephen N. Freundb,1 , Shaz Qadeerc , Sanjit A. Seshiad,2

      Add to Reading List

      Source URL: dept.cs.williams.edu

      Language: English - Date: 2018-08-12 09:38:32
        294

        Extracting Models of Security-Sensitive Operations using String-Enhanced White-Box Exploration on Binaries Juan Caballero Stephen McCamant

        Add to Reading List

        Source URL: www.adambarth.com

        Language: English - Date: 2009-03-09 03:50:31
          295

          Digital Photography Workshops with Stephen Johnson At Stephen Johnson Photography, we take the imparting of information and the empowerment of our students quite seriously. The digital age has considerably enhanced

          Add to Reading List

          Source URL: www.sjphoto.com

          Language: English - Date: 2016-10-11 15:38:23
            296

            12 Force-Directed Drawing Algorithms Stephen G. Kobourov University of Arizona

            Add to Reading List

            Source URL: cs.brown.edu

            - Date: 2013-06-24 01:29:28
              297

              Learning the Structure of Generative Models without Labeled Data Stephen H. Bach 1 Bryan He 1 Alexander Ratner 1 Christopher R´e 1 Abstract Curating labeled training data has become the

              Add to Reading List

              Source URL: proceedings.mlr.press

              - Date: 2018-02-06 15:06:57
                298

                GLOBAN Stochastic Modelling Exercise Stephen Gilmore Laboratory for Foundations of Computer Science The University of Edinburgh

                Add to Reading List

                Source URL: www2.imm.dtu.dk

                - Date: 2006-09-15 11:09:42
                  299

                  ARTICLE THE RIGHT TO BEAR ARMS IN THE VIRGINIA CONSTITUTION AND THE SECOND AMENDMENT: HISTORICAL DEVELOPMENT AND PRECEDENT IN VIRGINIA AND THE FOURTH CIRCUIT Stephen P. Halbrook†

                  Add to Reading List

                  Source URL: www.stephenhalbrook.com

                  - Date: 2015-10-05 17:19:42
                    300

                    Kirk Wolf Stephen Goetze Dovetailed Technologies, LLC Using z/OS to Access a Public Cloud Beyond the Hand-Waving

                    Add to Reading List

                    Source URL: dovetail.com

                    - Date: 2015-07-07 15:11:52
                      UPDATE