University of Technology

Results: 48361



#Item
11Computer hardware / Computer architecture / Computing / Side-channel attacks / Computer security / X86 architecture / Central processing unit / Computer memory / Spectre / Microarchitecture / CPU cache / Meltdown

NetSpectre: Read Arbitrary Memory over Network Michael Schwarz Martin Schwarzl Graz University of Technology

Add to Reading List

Source URL: mlq.me

Language: English - Date: 2018-08-17 12:03:32
12Radio-frequency identification / Automatic identification and data capture / Privacy / Ubiquitous computing / Wireless / Mobile RFID / SAM / Computing / Technology / Data

A Parallel Identification Protocol for RFID Systems Linghe Kong∗† , Liang He∗ , Yu Gu∗ , Min-You Wu† , Tian He‡ ∗ Singapore University of Technology and Design, Singapore † Shanghai Jiao Tong University,

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-14 12:02:36
13Surveillance / Biometrics / Security engineering / Computing / National security / Identification / Cybercrime / Keystroke dynamics / Soft biometrics / Typing / Computer security / Statistical classification

Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse Krátky Peter, Chudá Daniela Faculty of Informatics and Information Technologies Slovak University of Technology Ilkoviˇcova 5, Br

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:46:41
14Mathematical logic / Proof theory / Logic / Mathematics / Natural deduction / Sequent calculus / Sequent / First-order logic / Admissible rule / Conjunctive normal form / Quantifier / Cut-elimination theorem

Understanding Resolution Proofs through Herbrand’s Theorem‹ Stefan Hetzl1 , Tomer Libal2 , Martin Riener3 , and Mikheil Rukhaia4 1 Institute of Discrete Mathematics and Geometry, Vienna University of Technology

Add to Reading List

Source URL: www.logic.at

Language: English - Date: 2014-04-14 05:43:30
15Computing / System software / Software / Internet privacy / Computer network security / Device fingerprint / Internet fraud / HTTP cookie / Virtual machine / OpenVMS / Tor / VM

Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 10:57:28
16Theoretical computer science / Formal methods / Logic in computer science / Bisimulation / Applied mathematics / Mathematics / Scheduling / Transition system / -calculus

Bisimulation for demonic schedulers? Konstantinos Chatzikokolakis1 , Gethin Norman2 , and David Parker2 1 Eindhoven University of Technology 2

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2009-01-08 10:00:18
17California Institute of Technology faculty / Chiara Mingarelli / University of Birmingham / Birmingham / Supervisor / Doctor of Philosophy / Science and technology in Canada / Science and technology in Italy / Science

University of Birmingham Chiara Mingarelli Posted on Tuesday 14th April 2015 Marie Curie Postdoctoral Fellow, California Institute of Technology PhD Astrophysics (2014)

Add to Reading List

Source URL: www.chiaramingarelli.com

Language: English - Date: 2015-05-06 01:44:17
18Finite-state machine / Image segmentation / Machine learning / Cellular automata / Finite automata / Automata theory / Cognition / Cognitive science / Artificial intelligence

Towards inferring environment models for control functions from recorded signal data Henrik Peters, Falk Howar, Andreas Rausch Clausthal University of Technology, Department of Informatics Julius-Albert-Str. 4, 38678 Cla

Add to Reading List

Source URL: www.falkhowar.de

Language: English - Date: 2018-09-30 08:43:02
19Software engineering / Programming language theory / Computing / Type theory / Data types / Functional languages / Type systems / Lambda calculus / HindleyMilner type system / Haskell / Agda / Dependent type

Suggesting Valid Hole Fits for Typed-Holes (Experience Report) Matthías Páll Gissurarson Chalmers University of Technology, Sweden

Add to Reading List

Source URL: mpg.is

Language: English - Date: 2018-08-05 06:01:43
20Mathematical logic / Mathematics / Theoretical computer science / Automated theorem proving / Logic in computer science / Methods of proof / Boolean algebra / Mathematical proofs / Proof complexity / Boolean satisfiability problem

The Potential of Interference-Based Proof Systems Marijn J.H. Heule and Benjamin Kiesl The University of Texas at Austin and Vienna University of Technology ARCADE in Gothenburg, Sweden

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2017-08-06 02:05:36
UPDATE