University

Results: 634567



#Item
241Cryptocurrencies / Cryptography / Bitcoin / Computing / Alternative currencies / Economy / Blockchains / Transport Layer Security / Mining pool / Proof-of-stake / Cryptographic nonce / Peercoin

DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work Eric Wustrow University of Colorado Boulder Benjamin VanderSloot University of Michigan

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
242Computing / Software engineering / Computer programming / Methods of proof / Logic in computer science / Pointer / Exec / Counterexample / Objective-C / Model checking / Abstract interpretation / Operational semantics

Executable Counterexamples in Software Model Checking? Jeffrey Gennari1 , Arie Gurfinkel2 , Temesghen Kahsai3 , Jorge A. Navas4 , and Edward J. Schwartz1 Carnegie Mellon University1 , University of Waterloo2 , University

Add to Reading List

Source URL: jorgenavas.github.io

Language: English - Date: 2018-10-25 12:43:22
243Cryptography / Computational complexity theory / Randomized algorithms / Complexity classes / Probabilistically checkable proof / Proof theory / IP / NP / NEXPTIME / Soundness / PCP theorem / Commitment scheme

Making Argument Systems for Outsourced Computation Practical (Sometimes) Srinath Setty, Richard McPherson, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin Abstract This paper describes the desig

Add to Reading List

Source URL: www.pepper-project.org

Language: English - Date: 2017-11-11 14:59:54
244Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-07-09 00:19:47
245Computing / Semantic Web / Data / Information / Semantic HTML / Markup languages / Resource Description Framework / Data management / Schema.org / Microdata / JSON-LD / Creative work

A Minimum Viable Strategy for Archives and Linked Data using Schema.org Mark A. Matienzo, Stanford University / @anarchivist Society of American Archivists Session 303 #s303 16 August 2018

Add to Reading List

Source URL: matienzo.org

Language: English
246Algebra / Mathematics / Polynomials / Abstract algebra / Computer algebra / Polynomial / Factorization of polynomials / Constraint programming / Resultant / Constraint logic programming / Polynomial ring

Solving Non-Linear Arithmetic Dejan Jovanovi´c1 and Leonardo de Moura2 1 2 New York University

Add to Reading List

Source URL: csl.sri.com

Language: English - Date: 2014-06-27 12:47:14
247Elections / Voting / Politics / Get out the vote / Group decision-making / Canvassing / Voter turnout / Democracy / Experiment / Compulsory voting / Peer pressure / Donald Green

Journal of Elections, Public Opinion and Parties, 2013 Vol. 23, No. 1, 27 –48, http://dx.doi.orgField Experiments and the Study of Voter Turnout1 Downloaded by [Columbia University] at 07:

Add to Reading List

Source URL: www.mcmcgrath.com

Language: English - Date: 2015-09-29 23:07:18
248Computing / Dark web / Internet / Free software / Cryptographic protocols / Internet Standards / Secure communication / Tor / Operation Onymous / Noise pollution / National Security Agency

traffic confirmation attacks despite noise Jamie Hayes University College London

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2016-07-06 11:58:46
249Computing / Data management / Data / Business intelligence / Database management systems / Technology forecasting / Transaction processing / Dan Suciu / Big data / Probabilistic database / Data science / Analytics

University of Washington Database Group Quarterly Newsletter - FallUW Database Group Data management systems, cloud services, probabilistic databases, and data pricing in Computer Science & Engineering at the Univ

Add to Reading List

Source URL: db.cs.washington.edu

Language: English - Date: 2018-10-11 15:27:57
250Computer network security / Computing / Firewall software / Information and communications technology / Computer security / Data security / Internet censorship in China / Human rights in China / Firewall / Stateful firewall / Internet censorship / Router

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2011-03-10 12:58:06
UPDATE