Stevens

Results: 7728



#Item
51

Success Story | Stevens Institute of Technology Fast Remote Access to Graphics-Intensive Applications Upgrading their virtual environment with NVIDIA GRID™ technology is yielding cost savings and expanding opportuniti

Add to Reading List

Source URL: citrixready.citrix.com

Language: English - Date: 2018-07-30 19:39:52
    52

    PDF Document

    Add to Reading List

    Source URL: www.stevens.k-state.edu

    Language: English - Date: 2018-06-03 05:26:43
      53

      St. Kitts and Nevis Tsunami Ready Experience Claricia Langley-Stevens Tuesday 4th April, 2017

      Add to Reading List

      Source URL: eird.org

      Language: English - Date: 2017-04-06 16:42:24
        54

        Assembling global neural networks of the mouse brain Hong-Wei Dong USC Mark and Mary Stevens Neuroimaging and Informatics Institute, Keck School of Medicine of USC, University of Southern California The long term object

        Add to Reading List

        Source URL: scnw2018.cns.org.cn

        Language: English - Date: 2018-06-07 21:37:33
          55Algebra / Abstract algebra / Mathematics / Polynomials / Computer algebra / Invariant theory / Commutative algebra / Homogeneous polynomials / Monomial order / Polynomial ring / Faugre's F4 and F5 algorithms / Hidden Field Equations

          M4GB: An efficient Gr¨obner-basis algorithm Rusydi H. Makarim Marc Stevens Cryptology Group, Centrum Wiskunde en Informatica

          Add to Reading List

          Source URL: marc-stevens.nl

          Language: English - Date: 2017-08-13 07:48:58
          56

          PDF Document

          Add to Reading List

          Source URL: www.stevens.k-state.edu

          Language: English - Date: 2018-06-03 05:26:43
            57Cryptography / Cryptographic hash functions / Cryptographic protocols / MD5 / Hashing / Search algorithms / Public-key cryptography / Collision attack / Marc Stevens / Hash function / X.509 / Transport Layer Security

            Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 and Benne de Weger7 1

            Add to Reading List

            Source URL: marc-stevens.nl

            Language: English - Date: 2017-08-13 07:48:58
            58

            322 Int. J. Applied Cryptography, Vol. 2, No. 4, 2012 Chosen-prefix collisions for MD5 and applications Marc Stevens*

            Add to Reading List

            Source URL: documents.epfl.ch

            Language: English - Date: 2012-08-03 05:02:16
              59

              Modelling Multi-Issue Bargaining Dialogues: Data Collection, Annotation Design and Corpus Volha Petukhova*, Christopher Stevens**, Harmen de Weerd**, Niels Taatgen**, Fokie Cnossen** and Andrei Malchanau* *Saarland Unive

              Add to Reading List

              Source URL: www.harmendeweerd.nl

              Language: English - Date: 2017-02-27 04:22:37
                60

                Jim Stevens, K4MA Results, February 2006 Phone Sprint There is one word for this Sprint: Ugh! Conditions were probably the worst

                Add to Reading List

                Source URL: ncjweb.com

                Language: English - Date: 2013-10-29 10:40:15
                  UPDATE