A.K.

Results: 49486



#Item
31Algebra / Abstract algebra / Cohomology theories / Algebraic geometry / Homological algebra / Birational geometry / Algebraic surfaces / Cohomology / Projective variety / Hodge theory / tale cohomology / Kodaira dimension

FAKE PROJECTIVE SPACES AND FAKE TORI OLIVIER DEBARRE Abstract. Hirzebruch and Kodaira proved in 1957 that when n is odd, any compact K¨ ahler manifold X which is homeomorphic to Pn is isomorphic to Pn . This holds for a

Add to Reading List

Source URL: www.math.ens.fr

Language: English - Date: 2017-03-03 09:54:55
32Language / Culture / Index of standards articles / Standards / Bissa language

INVESTOR P R E S E N TAT I O N B L O C K O N E C A P I TA L I N C . TSX-V: BLOK OTCQB: BKPPF

Add to Reading List

Source URL: www.blockonecap.com

Language: English - Date: 2018-07-18 12:33:49
33Obfuscation / Languages of Cameroon

C O N V E N E C U L I N A RY LO O K B O O K SPRING / SUMMER 2018 Culinary Lookbook SPRING / SUMMER 2018

Add to Reading List

Source URL: convene.com

Language: English - Date: 2018-05-15 16:24:43
34Mathematical logic / Logic / Mathematics / Predicate logic / Formal methods / Semantics / Edsger W. Dijkstra / Predicate transformer semantics / First-order logic / FO / Quantifier / Equality

A Semantic Approach to Secure Information Flow K. Rustan M. Leino1 and Rajeev Joshi2 1 DEC SRC, Palo Alto, CA 94301, USA

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:26:03
35Computing / Information and communications technology / Computer network security / Networking hardware / Computer networking / Data transmission / Computer security / Firewall software / Middlebox / Computer appliance / Packet processing / Computer network

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2013-04-22 15:35:26
36Cryptography / Public-key cryptography / Cryptographic protocols / Key management / Public key infrastructure / DiffieHellman key exchange / Key exchange / Forward secrecy / RSA / Secure channel / XTR / Digital signature

A Framework for Universally Composable Diffie-Hellman Key Exchange Ralf K¨usters and Daniel Rausch University of Stuttgart Stuttgart, Germany Email: {ralf.kuesters, daniel.rausch}@informatik.uni-stuttgart.de

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:55:11
37Cryptocurrencies / Bitcoin / Alternative currencies / Money / Economy / Currency / Digital currencies / Blockchains / Mt. Gox / Silk Road / Satoshi Nakamoto / BitPay

A Fistful of Bitcoins Characterizing Payments Among Men with No Names SAR AH MEIKLE JOHN, MAR JORI POMAROLE , GR ANT JORDAN, K I R I L L L E VC H E N KO , DA M O N M C C OY, G E O F F R E Y M . VO E L K E R A N D S T E

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
38Mathematics / Mathematical analysis / Abstract algebra / Geometric group theory / Measure theory / Group theory / Boolean algebra / Experiment / Sigma-algebra / Determinacy / Kazhdan's property / Building

Continuous-Time Stochastic Games with Time-Bounded ReachabilityI Tom´ aˇs Br´ azdil, Vojtˇech Forejt1 , Jan Krˇc´al, Jan Kˇret´ınsk´ y2,∗, Anton´ın Kuˇcera

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2012-12-20 07:29:02
39Computing / Network architecture / Data transmission / Internet Standards / Internet protocols / Computer networking / Network performance / Units of information / Transmission Control Protocol / QUIC / Network address translation / User Datagram Protocol

A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols Mirja K¨uhlewind∗ , Tobias B¨uhler∗ , Brian Trammell∗ , Stephan Neuhaus† , Roman M¨untener† , and Gorry Fairhurst‡ ∗ ETH

Add to Reading List

Source URL: nsg.ee.ethz.ch

Language: English - Date: 2017-11-30 09:02:54
40Fingerprinting algorithms / Computing / Identification / Internet / Secure communication / Internet Protocol / TCP/IP stack fingerprinting / Fingerprint / Transmission Control Protocol / Tor

k-fingerprinting: a Robust Scalable Website Fingerprinting Technique Jamie Hayes University College London George Danezis

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2017-05-23 12:11:25
UPDATE