and Design

Results: 89851



#Item
41Higher education in China / Computer science / Ion Stoica / Science and technology in the United States / Databricks / Ali Ghodsi / Matei Zaharia / Hari Balakrishnan / Scott Shenker / Tsinghua University / Microsoft Research / Carnegie Mellon University

NSDI ’16: 13th USENIX Symposium on Networked Systems Design and Implementation March 16–18, 2016 Santa Clara, CA Message from the Program Co-Chairs. . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2017-07-14 07:19:47
42Fellows of the Econometric Society

Informational Substitutes Definitions and Design Yiling Chen and Bo Waggoner Harvard Computer Science July 2016

Add to Reading List

Source URL: www.bowaggoner.com

Language: English - Date: 2017-07-12 06:16:57
    43Radio-frequency identification / Automatic identification and data capture / Privacy / Ubiquitous computing / Wireless / Mobile RFID / SAM / Computing / Technology / Data

    A Parallel Identification Protocol for RFID Systems Linghe Kong∗† , Liang He∗ , Yu Gu∗ , Min-You Wu† , Tian He‡ ∗ Singapore University of Technology and Design, Singapore † Shanghai Jiao Tong University,

    Add to Reading List

    Source URL: wirelesslab.sjtu.edu.cn

    Language: English - Date: 2015-04-14 12:02:36
    44Mathematics / Graph theory / Computational complexity theory / Network theory / Edsger W. Dijkstra / Computational problems / Shortest path problem / Dynamic programming / Graph / Optimization problem / Bitcoin / Max-flow min-cut theorem

    Payment Network Design with Fees arXiv:1810.07585v1 [cs.DS] 17 Oct 2018 Georgia Avarikioti, Gerrit Janssen, Yuyi Wang, and Roger Wattenhofer ETH Zurich, Switzerland

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2018-10-17 20:54:30
    45Cryptography / Applied mathematics / Block cipher modes of operation / Block cipher / Symmetric-key algorithm / Stream cipher / Galois/Counter Mode / Data Encryption Standard / Authenticated encryption / Cryptanalysis / Public-key cryptography / Cryptographic hash function

    Intrinsic Side-Channel Analysis Resistance and Efficient Masking A case study of the use of SCA-related metrics and of design strategies leading to low-cost masking for CAESAR candidates

    Add to Reading List

    Source URL: ko.stoffelen.nl

    Language: English - Date: 2018-02-09 07:40:07
    46Higher education in China / Education in China / C9 League / Project 211 / Project 985 / Scott Shenker / Sylvia Ratnasamy / University of Science and Technology of China / Hari Balakrishnan / Microsoft Research / University of California /  Berkeley / Ion Stoica

    NSDI ’18: 15th USENIX Symposium on Networked Systems Design and Implementation April 9–11, 2018 Renton, WA, USA New Hardware

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2018-03-08 20:36:19
    47Type theory / Software engineering / Programming language theory / Computing / Scheme / System F / Type system / HindleyMilner type system / Racket / Boolean data type / Macro / Typing environment

    Higher-Order and Symbolic Computation manuscript No. (will be inserted by the editor) The Design and Implementation of Typed Scheme: From Scripts to Programs? Sam Tobin-Hochstadt · Matthias Felleisen

    Add to Reading List

    Source URL: homes.sice.indiana.edu

    Language: English - Date: 2013-08-15 14:47:07
    48Theoretical computer science / Mathematics / Formal methods / Logic in computer science / Models of computation / Temporal logic / Runtime verification / Formal verification / Model checking / Linear temporal logic / Finite-state machine / FO

    Runtime Verification Logics A Language Design Perspective Klaus Havelund1? and Giles Reger2?? 1 Jet Propulsion Laboratory, California Inst. of Technology, USA

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2017-08-22 15:37:59
    49Women's Islamic Games

    Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’16) Errata Slip In the paper “Be Fast, Cheap and in Control with SwitchKV” by Xiaozhou Li and Raghav Sethi, Princeton

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2017-07-14 07:19:47
      50Mathematics / Graph theory / Computational complexity theory / Network theory / Edsger W. Dijkstra / Computational problems / Combinatorial optimization / Shortest path problem / Dynamic programming / Graph / Optimization problem / Bitcoin

      Payment Network Design with Fees Georgia Avarikioti, Gerrit Janssen, Yuyi Wang, and Roger Wattenhofer ETH Zurich, Switzerland {zetavar,gjanssen,yuwang,wattenhofer}@ethz.ch Abstract. Payment channels are the most promine

      Add to Reading List

      Source URL: www.tik.ee.ethz.ch

      Language: English - Date: 2018-08-17 10:43:16
      UPDATE