System

Results: 641854



#Item
91Aviation safety / Aviation / Statistical natural language processing / Transport / Human behavior / Aviation Safety Reporting System / Aviation accidents and incidents / Topic model / Latent Dirichlet allocation / Air traffic control / Traffic collision avoidance system / Airport

Twelfth USA/Europe Air Traffic Management Research and Development Seminar (ATM2017) Topics and Trends in Incident Reports Using Structural Topic Modeling to Explore Aviation Safety Reporting System Data Kenneth D. Kuh

Add to Reading List

Source URL: www.atmseminarus.org

Language: English - Date: 2017-06-05 08:43:00
92Computer architecture / System software / Computing / Disk file systems / Ext4 / Ext3 / Sync / File system / Btrfs / XFS / Inode / File locking

Specifying and Checking File System Crash-Consistency Models James Bornholt Antoine Kaufmann Jialin Li

Add to Reading List

Source URL: unsat.cs.washington.edu

Language: English - Date: 2018-08-21 17:45:05
93Mathematics / Algebra / Theoretical computer science / Finite automata / Linear algebra / Finite-state transducer / Dynamic programming / Edit distance / Trace / Finite-state machine / Shortest path problem / Levenshtein distance

Suggesting Edits to Explain Failing Traces Giles Reger University of Manchester, UK Abstract. Runtime verification involves checking whether an execution trace produced by a running system satisfies a specification. Howe

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2016-07-20 13:08:32
94Cryptocurrencies / Bitcoin / Digital currencies / Cryptographic hash functions / Error detection and correction / Computing / Information retrieval / Information science / Vic coin / Bitcoin network / Blockchain / Merkle tree

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.bitcoincash.org

Language: English - Date: 2018-10-16 02:24:07
95Computing / Computer architecture / System software / Recall / Android / Pattern / Short-term memory / Student's t-test

SysPal: System-guided Pattern Locks for Android Geumhwan Cho1 , Jun Ho Huh2 , Junsung Cho1 , Seongyeol Oh1 , Youngbae Song1 , Hyoungshick Kim1 1 Department of Computer Science and Engineering, Sungkyunkwan University, So

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:19
96Cryptography / Public-key cryptography / Digital signature / Ring signature / Group signature / Pseudorandom function family / Commitment scheme / Random oracle / Secure multi-party computation

ANONIZE: A Large-Scale Anonymous Survey System Susan Hohenberger Johns Hopkins University Steven Myers

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-07-06 21:10:31
97Finance / Money / Economy / Investment / Funds / Little Book of Common Sense Investing / John C. Bogle / Index fund / Workplace wellness / Workplace / Buy and hold / Personal branding

ADVANCE INFORMATION Book Yourself Solid 3rd Ed The Fastest, Easiest, and Most Reliable System for Getting More Clients Than You Can Handle Even if You Hate

Add to Reading List

Source URL: panmacmillan.co.in

Language: English - Date: 2018-06-06 01:24:42
98Technology / Terms of service / Social networking services / Digital media / Law / Internet privacy / Children's Online Privacy Protection Act / Social networks / Privacy / World Wide Web / Computer network / Privacy concerns with social networking services

Area 3 (Security and Privacy) Danny Yoo () Abstract Imagine you are designing a Web-based system that enables sharing and communication between users who are as young as ten years of age. What are the secu

Add to Reading List

Source URL: www.hashcollision.org

Language: English
99Constructible universe / Mathematical logic / Mathematics / Set theory / Operator theory / Partial differential equations / Proof theory / Ordinal numbers / Moschovakis coding lemma / Symbol

VeriPhy: Verified Controller Executables from Verified Cyber-Physical System Models Brandon Bohrer Yong Kiam Tan

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2018-05-02 15:22:10
100Domain name system / Internet / Cryptography / Computing / Domain Name System Security Extensions / Sender Policy Framework / DNS-based Authentication of Named Entities / DMARC / Name server / Extension mechanisms for DNS / DNS root zone / Email authentication

Short Paper: On Deployment of DNS-based Security Enhancements Pawel Szalachowski and Adrian Perrig ETH Zurich, Switzerland Abstract. Although the Domain Name System (DNS) was designed as a naming

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
UPDATE