A.M.

Results: 165142



#Item
61

COMPLETE COUNT COMMISSION Chicago, JRTC, 100 West Randolph, RoomSpringfield, Illinois State Library, 300 South Second Street, Room 207 Tuesday, August 28, :00 a.m. AGENDA I.

Add to Reading List

Source URL: illinoiscensus2020.com

- Date: 2018-09-28 08:01:57
    62Cryptography / Transport Layer Security / Public key infrastructure / Public-key cryptography / Cryptographic protocols / Key management / Online Certificate Status Protocol / Certificate revocation list / X.509 / Certificate authority / OCSP stapling / Public key certificate

    CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers James Larisch∗ Bruce M. Maggs‡ ∗ Northeastern

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:42
    63

    COMPLETE COUNT COMMISSION Chicago, JRTC, 100 West Randolph, RoomSpringfield, Illinois State Library, 300 South Second Street, Room 207 Tuesday, September 25, :00 a.m. AGENDA I.

    Add to Reading List

    Source URL: illinoiscensus2020.com

    - Date: 2018-09-28 08:01:57
      64Probability theory / Statistical randomness / Probability / Markov models / Graph theory / Stochastic game / Probabilistic automaton / Game theory / Markov chain / Determinacy / Strategy / Markov decision process

      Compositional Strategy Synthesis for Stochastic Games with Multiple Objectives N. Basseta , M. Kwiatkowskaa,⇤, C. Wiltschea a Department of Computer Science, University of Oxford, United Kingdom

      Add to Reading List

      Source URL: www.prismmodelchecker.org

      Language: English - Date: 2017-06-28 16:10:52
      65Algebra / Abstract algebra / Algebraic geometry / Geometry / Moduli space / Divisor / Torsor / Sheaf / Algebraic variety

      MODULI OF STOKES TORSORS AND SINGULARITIES OF DIFFERENTIAL EQUATIONS by Jean-Baptiste Teyssier Abstract. — Let M be a meromorphic connection with poles along a smooth divisor

      Add to Reading List

      Source URL: jbteyssier.com

      Language: English - Date: 2018-04-10 02:14:08
      66Artificial neural networks / Computational neuroscience / Machine learning / Artificial intelligence / Applied mathematics / Computational linguistics / Natural language processing / Speech recognition / Convolutional neural network / Language model / Long short-term memory / Neural network

      Published as a conference paper at ICLRP ROGRAM S YNTHESIS FOR C HARACTER L EVEL L ANGUAGE M ODELING Pavol Bielik, Veselin Raychev & Martin Vechev Department of Computer Science, ETH Z¨urich, Switzerland

      Add to Reading List

      Source URL: files.sri.inf.ethz.ch

      Language: English - Date: 2018-09-05 10:55:59
      67Cryptocurrencies / Bitcoin / Alternative currencies / Money / Economy / Currency / Digital currencies / Blockchains / Mt. Gox / Silk Road / Satoshi Nakamoto / BitPay

      A Fistful of Bitcoins Characterizing Payments Among Men with No Names SAR AH MEIKLE JOHN, MAR JORI POMAROLE , GR ANT JORDAN, K I R I L L L E VC H E N KO , DA M O N M C C OY, G E O F F R E Y M . VO E L K E R A N D S T E

      Add to Reading List

      Source URL: smeiklej.com

      Language: English - Date: 2018-10-23 14:58:02
      68Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

      A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      Language: English - Date: 2017-06-07 20:45:26
      69Metaphysics / Data management / Computational linguistics / Big data / Technology forecasting / Transaction processing / Truth / Data integration / Natural language processing

      VERA: A Platform for Veracity Estimation over Web Data Mouhamadou Lamine Ba, Laure Berti-Equille, Kushal Shah, Hossam M. Hammady Qatar Computing Research Institute Hamad Bin Khalifa University Doha, Qatar

      Add to Reading List

      Source URL: gdac.uqam.ca

      Language: English - Date: 2017-10-04 00:26:25
      70Computing / Network architecture / Data transmission / Internet Standards / Internet protocols / Computer networking / Network performance / Units of information / Transmission Control Protocol / QUIC / Network address translation / User Datagram Protocol

      A Path Layer for the Internet: Enabling Network Operations on Encrypted Protocols Mirja K¨uhlewind∗ , Tobias B¨uhler∗ , Brian Trammell∗ , Stephan Neuhaus† , Roman M¨untener† , and Gorry Fairhurst‡ ∗ ETH

      Add to Reading List

      Source URL: nsg.ee.ethz.ch

      Language: English - Date: 2017-11-30 09:02:54
      UPDATE