AC

Results: 359273



#Item
171World Wide Web / Artificial intelligence / Computing / Human-based computation / Anti-spam / CAPTCHA / Computer security / Computer vision / URL shortening / Turing test / Internet bot / Google Search

PiSHi: Click the Images and I Tell if You Are a Human Maryam Mehrnezhad † ∗†

Add to Reading List

Source URL: homepages.cs.ncl.ac.uk

Language: English - Date: 2016-07-27 14:38:16
172System software / Software / Computing / Scripting languages / System administration / Cygwin / Red Hat software / Command shells / Unix shell / Environment variable / Shell script / Command-line interface

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2018-08-15 07:19:26
173Biology / American football in Japan / Keio University / Minato /  Tokyo / Medicine / Kitasato Shibasabur / Keio Medical Science Prize / Stanley B. Prusiner / Hideyuki Okano / Shigetada Nakanishi / Organoid / Kanagawa Prefecture

PDF Document

Add to Reading List

Source URL: research-highlights.keio.ac.jp

Language: English - Date: 2018-06-25 09:31:46
174Computing / Cross-platform software / Logic in computer science / Runtime verification / Benchmark / Standard Performance Evaluation Corporation / Marq / AspectJ / Java / Overclocking

Third International Competition on Runtime Verification CRV 2016 Giles Reger1 , Sylvain Hallé2 , and Yliès Falcone3 1

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2016-09-29 14:23:26
175Mathematics / Mathematical logic / Logic / Model theory / Logic in computer science / Semantics / Universal algebra / Boolean satisfiability problem / Interpretation / First-order logic / Resolution / Clause

Finding Finite Models in Multi-Sorted First-Order Logic? Giles Reger1 , Martin Suda1 , and Andrei Voronkov1,2,University of Manchester, Manchester, UK

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2016-07-20 16:49:46
176Internet / Computing / Cyberwarfare / Internet security / Computer network security / Internet Standards / Internet protocols / Transmission Control Protocol / Denial-of-service attack / TCP reset attack / IP address spoofing / Internet protocol suite

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-02-22 02:35:33
177Mathematical analysis / Mathematics / Constructible universe / Distribution

A Framework for Verification of Software with Time and Probabilities Marta Kwiatkowska1 , Gethin Norman2 , and David Parker1 1 2

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2010-09-08 19:38:18
178Benchmark / Standard Performance Evaluation Corporation / European BEST Engineering Competition / Computing / Information and communications technology

Third International Competition on Runtime Verification (CRV16) Giles Reger, Sylvain Hall´e, Yli`es Falcone RV 2016

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2016-09-29 14:24:12
179Computing / Software / Software release / Cloud clients / Parallel computing / Computer science / Chromium / Patch / Kernel / Operating system / Software deployment / Software quality

Multi-version Software Updates Cristian Cadar Petr Hosek Department of Computing Imperial College London {c.cadar, p.hosek}@imperial.ac.uk

Add to Reading List

Source URL: srg.doc.ic.ac.uk

Language: English - Date: 2012-04-24 06:18:24
180Botnets / Cybercrime / Computing / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis⇧ Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi Michalis Kallitsis§ Deepak Kumar†

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2018-01-19 09:59:23
UPDATE