University

Results: 634567



#Item
201Software / Firefox add-ons / Online advertising / Google Chrome extensions / Ad blocking software / Advertising-free media / Privacy Badger / Ghostery / Adblock Plus / NoScript / AdBlock / Ad blocking

Adblocking and Counter-Blocking: A Slice of the Arms Race Rishab Nithyanand Stony Brook University Sheharbano Khattak University of Cambridge

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:13
202Lambda calculus / Theoretical computer science / Mathematical logic / Declarative programming / Adjoint functors / Anonymous function / Type theory / Lambda lifting

Category Theory for Program Construction by Calculation Lambert Meertens CWI, Amsterdam and Department of Computing Science, Utrecht University

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-03 13:27:17
203Computing / Computer architecture / Computer engineering / Computer memory / Computer security / Memory management / Side-channel attacks / Software Guard Extensions / Cold boot attack / C dynamic memory allocation / Sync / Cache

Regaining Lost Cycles with HotCalls: A Fast Interface for SGX Secure Enclaves Ofir Weisse Valeria Bertacco Todd Austin University of Michigan oweisse/vale/

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
204Wireless networking / Computing / Information and communications technology / Computer networking / Technology / Network protocols / Data transmission / Internet of things / Vehicular ad hoc network / Wireless ad hoc network / Mobile ad hoc network / Network packet

Data Preference Matters: A New Perspective of Safety Data Dissemination in Vehicular Ad Hoc Networks Qiao Xiang1 , Xi Chen1, Linghe Kong1 , Lei Rao2 , Xue Liu1 1 School of Computer Science, McGill University, Canada, 2

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-14 12:02:56
205Cryptography / Radio electronics / Block ciphers / KeeLoq / Rolling code / Data Encryption Standard / ICE

Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2009-09-22 19:00:54
206Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 12:53:26
207Learning / Education / Human behavior / Educational psychology / Educational practices / Philosophy of education / Curricula / Bayesian network / Active learning / Question / Bayesian inference / Machine learning

Asking and evaluating natural language questions Anselm Rothe1 , Brenden M. Lake2 , and Todd M. Gureckis1 1 Department of Psychology, 2 Center for Data Science, New York University

Add to Reading List

Source URL: cims.nyu.edu

Language: English - Date: 2016-05-13 20:53:50
208C / Data types / Software engineering / Computing / Computer programming / Pointer / Compatibility of C and C++ / Const / Typedef

A Context-Sensitive Memory Model for Verification of C/C++ Programs Arie Gurfinkel and Jorge A. Navas University of Waterloo and SRI International SAS’17, August 30th, 2017

Add to Reading List

Source URL: seahorn.github.io

Language: English - Date: 2018-08-03 20:31:21
209Publishing / Academic publishing / Scholarly communication / Knowledge / Technical communication / Scientific journal / Open access / Scientific literature / Nature / Science / Scholarly peer review / Academic journal

Scientific Utopia: I. Opening scientific communication Brian A. Nosek University of Virginia Yoav Bar-Anan

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2012-05-07 20:00:06
210Cryptography / Steganography / Steganalysis / Bit numbering / Deep learning / Public-key cryptography / RSA / Generative adversarial network / Artificial neural network / Steganographic file system / BPCS-Steganography

Generating steganographic images via adversarial training Jamie Hayes University College London

Add to Reading List

Source URL: papers.nips.cc

Language: English - Date: 2018-02-13 04:01:42
UPDATE