121![A Parallel Identification Protocol for RFID Systems Linghe Kong∗† , Liang He∗ , Yu Gu∗ , Min-You Wu† , Tian He‡ ∗ Singapore University of Technology and Design, Singapore † Shanghai Jiao Tong University, A Parallel Identification Protocol for RFID Systems Linghe Kong∗† , Liang He∗ , Yu Gu∗ , Min-You Wu† , Tian He‡ ∗ Singapore University of Technology and Design, Singapore † Shanghai Jiao Tong University,](https://www.pdfsearch.io/img/5462bee3cc113bfff19822f0a5507947.jpg) | Add to Reading ListSource URL: wirelesslab.sjtu.edu.cnLanguage: English - Date: 2015-04-14 12:02:36
|
---|
122![OCTO AWARDED $25M CONTRACT TO PROVIDE FULL RANGE OF INFORMATION MANAGEMENT / INFORMATION TECHNOLOGY SERVICES TO DHA Octo’s Range of IT Capabilities Across Agile, Infrastructure, and User Experience Will Allow DHA’s R OCTO AWARDED $25M CONTRACT TO PROVIDE FULL RANGE OF INFORMATION MANAGEMENT / INFORMATION TECHNOLOGY SERVICES TO DHA Octo’s Range of IT Capabilities Across Agile, Infrastructure, and User Experience Will Allow DHA’s R](https://www.pdfsearch.io/img/c8025a954f255d3b479be72f8e15999b.jpg) | Add to Reading ListSource URL: www.octoconsulting.comLanguage: English - Date: 2018-10-10 08:58:33
|
---|
123![Comprehension of spacecraft telemetry using hierarchical specifications of behavior? Klaus Havelund and Rajeev Joshi Jet Propulsion Laboratory California Institute of Technology California, USA Comprehension of spacecraft telemetry using hierarchical specifications of behavior? Klaus Havelund and Rajeev Joshi Jet Propulsion Laboratory California Institute of Technology California, USA](https://www.pdfsearch.io/img/d468836dcaf244f15ed07013b9f4788d.jpg) | Add to Reading ListSource URL: rjoshi.orgLanguage: English - Date: 2014-10-22 16:12:25
|
---|
124![Carnegie Mellon University Africa Department Information and Communication TechnologyRwanda 2018‐2019 Handbook Master’s Degree in Information Technology (MSIT) Carnegie Mellon University Africa Department Information and Communication TechnologyRwanda 2018‐2019 Handbook Master’s Degree in Information Technology (MSIT)](https://www.pdfsearch.io/img/70c126b41c508931c5fcedbec5710c6d.jpg) | Add to Reading ListSource URL: www.africa.engineering.cmu.eduLanguage: English - Date: 2018-09-12 05:46:12
|
---|
125![Interaction technology Open up your banking platform to accelerate the pace of innovation around your services.
Interaction Interaction technology Open up your banking platform to accelerate the pace of innovation around your services.
Interaction](https://www.pdfsearch.io/img/81a24605555580f60fe3f31d0a39f54c.jpg) | Add to Reading ListSource URL: www.temenos.comLanguage: English - Date: 2016-05-25 07:15:45
|
---|
126![Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse Krátky Peter, Chudá Daniela Faculty of Informatics and Information Technologies Slovak University of Technology Ilkoviˇcova 5, Br Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse Krátky Peter, Chudá Daniela Faculty of Informatics and Information Technologies Slovak University of Technology Ilkoviˇcova 5, Br](https://www.pdfsearch.io/img/91aa92a4e51bf154114b91ff174a0fdf.jpg) | Add to Reading ListSource URL: gdac.uqam.caLanguage: English - Date: 2017-10-04 00:46:41
|
---|
127![Understanding Resolution Proofs through Herbrand’s Theorem‹ Stefan Hetzl1 , Tomer Libal2 , Martin Riener3 , and Mikheil Rukhaia4 1 Institute of Discrete Mathematics and Geometry, Vienna University of Technology Understanding Resolution Proofs through Herbrand’s Theorem‹ Stefan Hetzl1 , Tomer Libal2 , Martin Riener3 , and Mikheil Rukhaia4 1 Institute of Discrete Mathematics and Geometry, Vienna University of Technology](https://www.pdfsearch.io/img/a1145d7c87226f243bf0f32c31c2708f.jpg) | Add to Reading ListSource URL: www.logic.atLanguage: English - Date: 2014-04-14 05:43:30
|
---|
128![Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing, Poster: Tracking VM Attackers Based on Browser Fingerprinting Xiaoxi Wang1, Min Li2, Xiaoyun Li2, Qixu Liu34 1 Beijing University of Technology, Beijing, China Beijing University of Posts and Telecommunications, Beijing,](https://www.pdfsearch.io/img/bc122e6874ad7cc2d3a5a57076e9a1d9.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-12 10:57:28
|
---|
129![Bisimulation for demonic schedulers? Konstantinos Chatzikokolakis1 , Gethin Norman2 , and David Parker2 1 Eindhoven University of Technology 2 Bisimulation for demonic schedulers? Konstantinos Chatzikokolakis1 , Gethin Norman2 , and David Parker2 1 Eindhoven University of Technology 2](https://www.pdfsearch.io/img/a7a5dcbd2ba925211846932703608ff9.jpg) | Add to Reading ListSource URL: qav.comlab.ox.ac.ukLanguage: English - Date: 2009-01-08 10:00:18
|
---|
130![University of Birmingham Chiara Mingarelli Posted on Tuesday 14th April 2015 Marie Curie Postdoctoral Fellow, California Institute of Technology PhD Astrophysics (2014) University of Birmingham Chiara Mingarelli Posted on Tuesday 14th April 2015 Marie Curie Postdoctoral Fellow, California Institute of Technology PhD Astrophysics (2014)](https://www.pdfsearch.io/img/f8afafcd53beb5b650ab5916945d9ab9.jpg) | Add to Reading ListSource URL: www.chiaramingarelli.comLanguage: English - Date: 2015-05-06 01:44:17
|
---|