2-2-2

Results: 835450



#Item
151V´erification de programmes C concurrents avec Cubicle : Enfoncer les barri`eres Sylvain Conchon1,2 & David Declerck1 & Luc Maranget3 & Alain Mebsout1,2 1: Universit´e Paris Sud, CNRS, FOrsay ˆ 2: INRIA Saclay

V´erification de programmes C concurrents avec Cubicle : Enfoncer les barri`eres Sylvain Conchon1,2 & David Declerck1 & Luc Maranget3 & Alain Mebsout1,2 1: Universit´e Paris Sud, CNRS, FOrsay ˆ 2: INRIA Saclay

Add to Reading List

Source URL: mebsout.github.io

Language: French - Date: 2017-07-21 11:03:15
    152Multivariate Public Key Cryptography Jintai Ding 1  2

    Multivariate Public Key Cryptography Jintai Ding 1 2

    Add to Reading List

    Source URL: precision.moscito.org

    Language: English - Date: 2013-03-10 22:42:02
    153Colorado Supreme Court 2 East 14th Avenue Denver, CODATE FILED: June 8, 2018

    Colorado Supreme Court 2 East 14th Avenue Denver, CODATE FILED: June 8, 2018

    Add to Reading List

    Source URL: www.courts.state.co.us

    - Date: 2018-06-11 08:53:44
      154Data Preference Matters: A New Perspective of Safety Data Dissemination in Vehicular Ad Hoc Networks Qiao Xiang1 , Xi Chen1, Linghe Kong1 , Lei Rao2 , Xue Liu1 1 School of Computer Science, McGill University, Canada, 2

      Data Preference Matters: A New Perspective of Safety Data Dissemination in Vehicular Ad Hoc Networks Qiao Xiang1 , Xi Chen1, Linghe Kong1 , Lei Rao2 , Xue Liu1 1 School of Computer Science, McGill University, Canada, 2

      Add to Reading List

      Source URL: wirelesslab.sjtu.edu.cn

      Language: English - Date: 2015-04-14 12:02:56
      155Answers/Hints for Labs in Learn Git in a Month of Lunches Rick Umali June 22, 2016  2

      Answers/Hints for Labs in Learn Git in a Month of Lunches Rick Umali June 22, 2016 2

      Add to Reading List

      Source URL: manning-content.s3.amazonaws.com

      Language: English - Date: 2016-07-01 13:43:50
      156Selecting the Selection? Kryˇstof Hoder, Giles Reger1 , Martin Suda1 , and Andrei Voronkov1,2,3 1 2

      Selecting the Selection? Kryˇstof Hoder, Giles Reger1 , Martin Suda1 , and Andrei Voronkov1,2,3 1 2

      Add to Reading List

      Source URL: www.cs.man.ac.uk

      Language: English - Date: 2016-07-20 16:49:24
      157Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

      Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2009-09-22 19:00:54
      158Toronto | May 31-June 2, 2019  Sponsorship A BLOCKCHAIN CONFERENCE FEATURING INDUSTRY LEADERS

      Toronto | May 31-June 2, 2019 Sponsorship A BLOCKCHAIN CONFERENCE FEATURING INDUSTRY LEADERS

      Add to Reading List

      Source URL: cryptochickshackathon.com

      Language: English - Date: 2018-10-23 00:42:08
      159Asking and evaluating natural language questions Anselm Rothe1 , Brenden M. Lake2 , and Todd M. Gureckis1 1 Department of Psychology, 2 Center for Data Science, New York University

      Asking and evaluating natural language questions Anselm Rothe1 , Brenden M. Lake2 , and Todd M. Gureckis1 1 Department of Psychology, 2 Center for Data Science, New York University

      Add to Reading List

      Source URL: cims.nyu.edu

      Language: English - Date: 2016-05-13 20:53:50
      160Application Performance Optimizations (Part 2) Pak Lui  130 Applications Best Practices Published

      Application Performance Optimizations (Part 2) Pak Lui 130 Applications Best Practices Published

      Add to Reading List

      Source URL: hpcadvisorycouncil.com

      Language: English - Date: 2015-03-24 12:02:39