Twente

Results: 952



#Item
11

Formal Specification of LinkedBlockingQueue Using Concurrent Separation Logic Jeroen Meijer University of Twente P.O. Box 217, 7500AE Enschede The Netherlands

Add to Reading List

Source URL: fmt.cs.utwente.nl

Language: English - Date: 2011-07-12 07:16:33
    12

    Adaptive Web Crawling through Stucture-Based Link Classification Muhammad Faheem Universiteit Twente, 2 June 2016

    Add to Reading List

    Source URL: pierre.senellart.com

    Language: English - Date: 2016-06-02 02:25:41
      13

      GEOBON ACTIVITIES ANDREW SKIDMORE ITC, UNIVERSITY TWENTE Introduction

      Add to Reading List

      Source URL: www.gofcgold.wur.nl

      Language: English - Date: 2016-11-17 15:17:22
        14

        Kernel Support for Distributed Systems Sape J. Mullender Huygens Systems Research Laboratory Universiteit Twente

        Add to Reading List

        Source URL: wwwhome.cs.utwente.nl

        Language: English - Date: 2001-09-26 04:20:28
          15

          PANACEA: AUTOMATING ATTACK CLASSIFICATION FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEMS DAMIANO BOLZONI, SANDRO ETALLE AND PIETER HARTEL DISTRIBUTED AND EMBEDDED SECURITY GROUP TWENTE SECURITY LAB

          Add to Reading List

          Source URL: www.rennes.supelec.fr

          Language: English - Date: 2009-10-01 09:50:26
            16

            A VERIFICATION TECHNIQUE FOR DETERMINISTIC PARALLEL PROGRAMS MARIEKE HUISMAN UNIVERSITY OF TWENTE, NETHERLANDS JOINT WORK WITH SAEED DARABI AND STEFAN BLOM

            Add to Reading List

            Source URL: www.sci.unich.it

            - Date: 2017-10-23 05:21:59
              17

              Specification and verification of GPGPU programs Stefan Blom, Marieke Huisman and Matej Mihelˇci´c University of Twente, Enschede, The Netherlands {s.c.c.blom,m.huisman}@utwente.nl November 8, 2013

              Add to Reading List

              Source URL: eprints.eemcs.utwente.nl

              - Date: 2013-11-07 12:44:35
                18

                On the Organisation of Program Verification Competitions Marieke Huisman1 , Vladimir Klebanov2 , and Rosemary Monahan3 1 University of Twente, The Netherlands

                Add to Reading List

                Source URL: ceur-ws.org

                - Date: 2012-07-04 10:49:53
                  19

                  Witnessing the Elimination of Magic Wands Stefan Blom and Marieke Huisman University of Twente November 8, 2013 Abstract. This paper discusses the use and verification of magic wands. Magic wands are used to specify

                  Add to Reading List

                  Source URL: eprints.eemcs.utwente.nl

                  - Date: 2013-11-07 12:31:39
                    20

                    GOODWARE DRUGS FOR MALWARE: ON-THE-FLY MALWARE ANALYSIS AND CONTAINMENT DAMIANO BOLZONI CHRISTIAAN SCHADE TWENTE SECURITY LAB

                    Add to Reading List

                    Source URL: media.blackhat.com

                    - Date: 2012-04-07 14:52:47
                      UPDATE