1 2

Results: 258872



#Item
181Literature / Speculative fiction / The Giver / Science fiction / Radio receiver / Son / Lino Guzzella

Word-Dokumentvorlage Version 1.2 (ML)

Add to Reading List

Source URL: www.paccar.ethz.ch

Language: English - Date: 2007-04-01 22:23:52
182

Příloha č. 1 - specifikace Příloha č. 2 – stávající prostředí informačního systému objednatele HARDWARE

Add to Reading List

Source URL: www.praguecc.cz

- Date: 2018-10-02 07:46:03
    183Computing / Information science / User interface techniques / Humancomputer interaction / Software architecture / User interfaces / Human communication / User interface / Virtual reality / Conversational user interfaces / Chatbot / Graphical user interface

    An Independent Bot Economy for a Trusted AI Future Everything Grows From SEED White Paper version 2.1 October 2018

    Add to Reading List

    Source URL: static.seedtoken.io

    Language: English - Date: 2018-10-01 10:43:39
    184Theoretical computer science / Software engineering / Mathematical software / Formal methods / Proof assistants / Logic in computer science / Automated theorem proving / Isabelle / Automated reasoning / E theorem prover / Formal verification / KeY

    Towards Strong Higher-Order Automation for Fast Interactive Verification Jasmin Christian Blanchette1,2,3 , Pascal Fontaine3 , Stephan Schulz4 , and Uwe Waldmann2 1

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2017-07-30 15:10:52
    185Finance / Economy / Money / Stock market / Depositary receipts / American depositary receipt / NASDAQ / Fee / N-Shares / Listing

    To Opt-In, follow these instructions: 1) Create a New Listing Center account, if you do not already have one. 2) Login to the Listing Center. If you forgot your password, press the "Forgot your password link?" 3) Once yo

    Add to Reading List

    Source URL: listingcenter.nasdaq.com

    Language: English - Date: 2015-09-02 14:42:01
    186Software engineering / Programming language theory / Computing / Logic in computer science / Horn clause / Control flow / ALGOL 68 / Formal methods / Logic programming

    Finding Inconsistencies in Programs with Loops? Temesghen Kahsai1 , Jorge A. Navas2 , Dejan Jovanovi´c3 , Martin Sch¨af3 1 2

    Add to Reading List

    Source URL: jorgenavas.github.io

    Language: English - Date: 2018-10-25 12:43:22
    187Cryptography / Mathematics / Algebra / Post-quantum cryptography / Lattice-based cryptography / Linear algebra / Lattice points / Lattice reduction / Lattice / Crystal structure / GramSchmidt process / Lattice problem

    Measuring, simulating and exploiting the head concavity phenomenon in BKZ Shi Bai1 , Damien Stehl´e2 , and Weiqiang Wen2 1 2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-09-11 03:08:31
    188

    Phalempins TOURCOING 1 2

    Add to Reading List

    Source URL: www.univ-lille.fr

    Language: French - Date: 2018-07-09 10:15:11
      189

      Fluhrer−McGrew biases in initial keystream bytes 2−6.5 (0, 0) (0, 1) (0,i+1)

      Add to Reading List

      Source URL: www.rc4nomore.com

      - Date: 2018-09-24 16:02:05
        190Computing / Computer security / Cyberwarfare / Computer network security / Cryptographic protocols / Secure communication / Transport Layer Security / Web application security / Application security / HTTP cookie / HTTPS / Cross-site scripting

        Airlock and the OWASP TOPVersion 2.1  OWASP Top 10 A1 – Injection ........................................................................................................................ 3 A2

        Add to Reading List

        Source URL: www.airlock.com

        Language: English - Date: 2017-11-28 05:42:02
        UPDATE