University

Results: 634567



#Item
81Peace and conflict studies / Scott Gates / Peace / Political science / Ethics / Political philosophy / Monica Toft / Milton Heumann

Kathleen Gallagher Cunningham Dept. of Government and Politics, University of Maryland 3140 Tydings Hall, College Park, MDCurrent Positions – present

Add to Reading List

Source URL: www.kathleengallaghercunningham.com

Language: English - Date: 2018-10-20 16:03:55
82Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benjaminvandersloot.com

Language: English - Date: 2018-09-18 11:06:16
83

Journeys in World Politics, October 28th-30th, 2004 Sponsored by the University of Iowa College of Liberal Arts & Sciences, with Support from the Department of Political Science Thursday, Oct. 28 6:30-8:30 p.m. Dinner

Add to Reading List

Source URL: www.saramitchell.org

Language: English - Date: 2009-07-21 12:23:20
    84Evaluation

    Defensio, Master Thesis, University of Innsbruck, IMPLEMENTATION & EVALUATION OF THE KNOWLEDGE ELEMENT PREPARATION MODEL RESEARCH OBJECTIVE

    Add to Reading List

    Source URL: www.maria-a-schett.net

    Language: English - Date: 2016-12-11 09:15:12
      85Logic / Mathematical logic / Mathematics / Propositional calculus / Logical truth / Logic in computer science / Syntax / Automated theorem proving / Resolution / Frege system / Boolean satisfiability problem / First-order logic

      The Potential of Interference-Based Proof Systems Marijn J.H. Heule1 and Benjamin Kiesl2 1 2 Department of Computer Science, The University of Texas at Austin

      Add to Reading List

      Source URL: www.cs.man.ac.uk

      Language: English - Date: 2017-08-02 12:35:21
      86Political science / International relations / Global politics / Conflict / Conflict resolution / Dispute resolution / Family therapy / Reconciliation / Wiegand / Peace and conflict studies / American University School of International Service / Territorial dispute

      DR. KRISTA E. WIEGAND Director, Global Security Program Howard H. Baker Jr. Center for Public Policy University of Tennessee, Knoxville 1640 Cumberland Ave. Knoxville, TN

      Add to Reading List

      Source URL: www.kristawiegand.com

      Language: English - Date: 2018-09-10 12:37:41
      87Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

      HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-12 23:38:22
      88Parallel computing / Computing / Computer engineering / Computer science / Electrical engineering / Electronic engineering / Electromagnetism / Message Passing Interface / Model checking / Computer programming / Computational science / Simulation

      The Toolkit for Accurate Scientific Software Stephen F. Siegel, Timothy Zirkel, Yi Wei Verified Software Laboratory Department of Computer and Information Sciences University of Delaware Newark, DE, USA

      Add to Reading List

      Source URL: www.lix.polytechnique.fr

      Language: English - Date: 2010-07-21 10:31:15
      89Computer programming / Computing / Mathematics / Theoretical computer science / Boolean algebra / Error detection and correction / Compiler construction / Hash function / Avalanche effect / Optimizing compiler / Recursion / MD5

      Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:56:44
      90Cryptography / Distributed computing architecture / Parallel computing / MapReduce / Certificate / IP / NP / Commitment scheme / PP / Computational complexity theory

      Verifying computations with state Benjamin Braun, Ariel J. Feldman⋆ , Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin ⋆ University of Pennsylvania Abstract When

      Add to Reading List

      Source URL: www.pepper-project.org

      Language: English - Date: 2017-11-11 14:59:54
      UPDATE