University

Results: 634567



#Item
701Information / Data management / Computing / Cryptography / Big data / Technology forecasting / Transaction processing / Differential Privacy / Data retention / Internet privacy / Geographic information system / Privacy

Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization Mathias Lecuyer∗1 , Riley Spahn∗1 , Roxana Geambasu1 , Tzu-Kuo Huang†2 , and Siddhartha Sen3 1 Columbia University, 2 Uber Advanced Tec

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:30
702Computing / Internet / Free software / Dark web / Cryptographic protocols / Tor / Onion routing / Relay

guard sets for onion routing Jamie Hayes - joint work with George Danezis University College London

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2015-05-28 09:34:34
703Information and communications technology / Computing / Ethernet / Internet architecture / Computer network / Telecommunications engineering / Network switch / Low latency / Routing / Node / Replication / Information Age

NetChain: Scale-Free Sub-RTT Coordination Xin Jin1 , Xiaozhou Li2 , Haoyu Zhang3 , Nate Foster2,4 , Jeongkeun Lee2 , Robert Soul´e2,5 , Changhoon Kim2 , Ion Stoica6 1 Johns Hopkins University, 2 Barefoot Networks, 3 Pr

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2018-02-22 15:27:09
704Robotics / Artificial intelligence / Humanrobot interaction / Robot / Emerging technologies / Multi-agent system / Cognitive robotics / Leonardo / Humanoid robot

Human-Robot Communication in Automated Planning Aleck MacNally University of Melbourne Parkville VIC 3010

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-09 08:09:32
705Cryptography / Public-key cryptography / Key management / Transport Layer Security / Internet Standards / Public key infrastructure / Domain Name System Security Extensions / Public key certificate / Certificate authority / X.509 / DNS root zone / Man-in-the-middle attack

XXXX Authentication Challenges in a Global Environment Stephanos Matsumoto, Carnegie Mellon University/ETH Zurich Raphael M. Reischuk, ETH Zurich Pawel Szalachowski, ETH Zurich Tiffany Hyun-Jin Kim, HRL Laboratories

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
706Computing / Graphical user interfaces / Software / System software / Programming paradigms / Widget toolkits / Reactive programming / Widget / Functional programming / Ext JS / Software widget / User interface markup language

First Year Report Ivan Perez University of Nottingham 2

Add to Reading List

Source URL: www.cs.nott.ac.uk

Language: English - Date: 2018-10-16 07:48:38
707Cryptography / Public-key cryptography / Computational complexity theory / Zero-knowledge proof / Proof of knowledge / Commitment scheme / Non-interactive zero-knowledge proof / IP / Cryptographic protocol / NP / RSA / Zero knowledge

ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash Sarah Meiklejohn University of California, San Diego smeiklej@ cs.ucsd.edu

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-06-18 19:02:40
708Software engineering / Computing / Declarative programming / Functional programming / Lambda calculus / Data types / Models of computation / Exponentials / Eval / Interpreter / Scheme / Exponential function

Collapsing Towers of Interpreters NADA AMIN, University of Cambridge, UK TIARK ROMPF, Purdue University, USA Given a tower of interpreters, i.e., a sequence of multiple interpreters interpreting one another as input prog

Add to Reading List

Source URL: lampwww.epfl.ch

Language: English - Date: 2017-11-23 15:55:32
709Software engineering / Computer programming / Theoretical computer science / Automated theorem proving / Lisp / ACL2 / Formal methods / Logic in computer science / Robert S. Boyer

Industrial Use of ACL2: Applications, Achievements, Challenges, and Directions J Strother Moore and Marijn J.H. Heule Department of Computer Science The University of Texas at Austin {moore,marijn}@cs.utexas.edu

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2017-07-30 15:10:42
710Humancomputer interaction / Reality / Computing / User interface techniques / Augmented reality / Mixed reality / Virtual reality / Multimodal interaction / Microsoft HoloLens / Head-mounted display / Internet privacy / JavaScript

1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:40
UPDATE