Web

Results: 217282



#Item
141Law / Terms of service / Identity management / Privacy / Abbott / Internet privacy / Medical privacy / Implied warranty

ONLINE TERMS AND CONDITIONS Effective Date of these Online Terms of Use: 01-Mar-2007 These Online Terms of Use govern your access to web sites controlled by Abbott Laboratories, including its subsidiaries and affiliates

Add to Reading List

Source URL: www.pk.abbott

Language: English - Date: 2018-08-03 09:24:56
142Economy / Marketing / Business / Digital marketing / Business intelligence / Brand management / Customer experience / Market research / Customer data platform / Analytics / Web analytics / Conversion marketing

WHITEPAPER The Death of Web Analytics and the Rise of the Build-Your-Own Customer Data Platform

Add to Reading List

Source URL: info.heapanalytics.com

Language: English - Date: 2018-10-25 07:46:49
143Computing / Computer programming / Software engineering / Functional languages / High-level programming languages / Computer access control / Object-capability model / JavaScript / Heap / Topological space / Monad / Caja project

Object Capabilities and Isolation of Untrusted Web Applications Sergio Maffeis Imperial College London John C. Mitchell Stanford University

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2010-03-08 04:28:13
144Computational complexity theory / Complexity classes / Theory of computation / NP / Probabilistically checkable proof / IP / Proof of knowledge / Reduction / NC / Craig interpolation / EXPTIME / Combinatory logic

Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems∗ Eli Ben-Sasson† Alessandro Chiesa†

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2017-08-28 19:17:10
145Surveillance / Biometrics / Security engineering / Computing / National security / Identification / Cybercrime / Keystroke dynamics / Soft biometrics / Typing / Computer security / Statistical classification

Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse Krátky Peter, Chudá Daniela Faculty of Informatics and Information Technologies Slovak University of Technology Ilkoviˇcova 5, Br

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:46:41
146Mathematics / Fellows of the Econometric Society / Austrian nobility / Hungarian nobility / John von Neumann / Lszl Lovsz / Andrs Prkopa

Curriculum Vitae L´ aszl´ o Lov´ asz Born: March 9, 1948 in Budapest, Hungary

Add to Reading List

Source URL: web.cs.elte.hu

Language: English - Date: 2012-09-05 08:40:47
147Computing / Internet / Internet protocols / Network architecture / Internet privacy / Internet security / Internet Standards / Network protocols / Hypertext Transfer Protocol / SOCKS / HTTP cookie / World Wide Web

Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Ben Jones Sam Burnett Nick Feamster Sean Donovan Sarthak Grover Sathya Gunasekaran Karim Habak

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-20 04:48:06
148

«Alle brauchen IT. Unsere Web- und Mobilelösungen werden täglich mit Freude genutzt. Ganz ohne Ärger, weil sie einfach funktionieren.» Mit dieser Vision realisieren und betreiben wir zukunftsweisende Software-Lösun

Add to Reading List

Source URL: www.exanic.ch

Language: German - Date: 2018-10-26 03:07:33
    149

    Timothy Alden Davis Department Computer Science and Engineering Texas A&M University 3112 TAMU, College Station, Texasemail: web: http://faculty.cse.tamu.edu/davis

    Add to Reading List

    Source URL: faculty.cse.tamu.edu

    Language: English - Date: 2018-06-27 12:39:25
      150

      Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark,† Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan MIT CSAIL and † Meteor Developme

      Add to Reading List

      Source URL: people.csail.mit.edu

      Language: English
        UPDATE