51![Online parallel scheduling of non-uniform tasks: Trading failures for energy Online parallel scheduling of non-uniform tasks: Trading failures for energy](https://www.pdfsearch.io/img/3f248be1bf42eafa0bbfefa7f5c9e3f6.jpg) | Add to Reading ListSource URL: www.cs.ucy.ac.cyLanguage: English - Date: 2015-01-23 01:11:03
|
---|
52![Performing Dynamically Injected Tasks on Processes Prone to Crashes and Restarts Chryssis Georgiou∗ Department of Computer Science, University of Cyprus [removed] Performing Dynamically Injected Tasks on Processes Prone to Crashes and Restarts Chryssis Georgiou∗ Department of Computer Science, University of Cyprus [removed]](https://www.pdfsearch.io/img/c7bb9cab742c4fa46734e881f2bb8078.jpg) | Add to Reading ListSource URL: www.cs.ucy.ac.cyLanguage: English - Date: 2011-09-05 06:01:37
|
---|
53![Meeting the Deadline: On the Complexity of Fault-Tolerant Continuous Gossip∗ Chryssis Georgiou† Seth Gilbert‡ Meeting the Deadline: On the Complexity of Fault-Tolerant Continuous Gossip∗ Chryssis Georgiou† Seth Gilbert‡](https://www.pdfsearch.io/img/fb4f51a8b8f6a2fda3599e24d6a57678.jpg) | Add to Reading ListSource URL: www.cs.ucy.ac.cyLanguage: English - Date: 2011-10-13 04:45:49
|
---|
54![Mach Learn: 69–83 DOIs10994Mining adversarial patterns via regularized loss minimization Wei Liu · Sanjay Chawla Mach Learn: 69–83 DOIs10994Mining adversarial patterns via regularized loss minimization Wei Liu · Sanjay Chawla](https://www.pdfsearch.io/img/a02c577945dc20499824588d94cde91d.jpg) | Add to Reading ListSource URL: www.cmcrc.comLanguage: English - Date: 2013-08-20 22:22:50
|
---|
55![Repeated Games against Budgeted Adversaries Manfred K. Warmuth† Department of Computer Science UC Santa Cruz [removed] Repeated Games against Budgeted Adversaries Manfred K. Warmuth† Department of Computer Science UC Santa Cruz [removed]](https://www.pdfsearch.io/img/fac54788b9ab3674cc3c754ae012f9fb.jpg) | Add to Reading ListSource URL: papers.nips.ccLanguage: English - Date: 2014-02-24 03:39:46
|
---|
56![How to Hedge an Option Against an Adversary: Black-Scholes Pricing is Minimax Optimal Jacob Abernethy University of Michigan [removed] How to Hedge an Option Against an Adversary: Black-Scholes Pricing is Minimax Optimal Jacob Abernethy University of Michigan [removed]](https://www.pdfsearch.io/img/1710870334b93dd87a30e1020c3a129f.jpg) | Add to Reading ListSource URL: papers.nips.ccLanguage: English - Date: 2014-11-26 14:13:18
|
---|
57![Minimax Policies for Combinatorial Prediction Games S´ebastien Bubeck1 joint work with Jean-Yves Audibert2,3 and G´ abor Lugosi4 Minimax Policies for Combinatorial Prediction Games S´ebastien Bubeck1 joint work with Jean-Yves Audibert2,3 and G´ abor Lugosi4](https://www.pdfsearch.io/img/e7a03ebb2da531d901676181accad07e.jpg) | Add to Reading ListSource URL: www.princeton.eduLanguage: English - Date: 2011-10-05 04:54:04
|
---|
58![NRL Release Number[removed]Dolev-Yao is no better than Machiavelli Paul Syverson, Catherine Meadows Center for High Assurance Computer Systems NRL Release Number[removed]Dolev-Yao is no better than Machiavelli Paul Syverson, Catherine Meadows Center for High Assurance Computer Systems](https://www.pdfsearch.io/img/095b626a361c140fb19e79829eeb265f.jpg) | Add to Reading ListSource URL: www.nrl.navy.milLanguage: English - Date: 2013-04-29 11:52:34
|
---|
59![Carleton University Honours Project Knowledge in Rendezvous of Agents with Different Speeds Evan Huus [removed] Supervised by Professor E. Kranakis, Carleton University Honours Project Knowledge in Rendezvous of Agents with Different Speeds Evan Huus [removed] Supervised by Professor E. Kranakis,](https://www.pdfsearch.io/img/9b38fd7716fe36a50e0c3ea14a39b0a8.jpg) | Add to Reading ListSource URL: dl.dropboxusercontent.comLanguage: English |
---|
60![Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de Bounded Memory Protocols Max Kanovich1 , Tajana Ban Kirigin2 , Vivek Nigam3 , Andre Scedrov4 Abstract It is well-known that the Dolev-Yao adversary is a powerful adversary. Besides acting as the network, intercepting, de](https://www.pdfsearch.io/img/7532920a95f29ee25f5a0288c014ceb9.jpg) | Add to Reading ListSource URL: bib.irb.hrLanguage: English - Date: 2014-08-21 13:21:17
|
---|