Amit

Results: 961



#Item
41ownership is theft: experiences building an embedded os in rust Amit Levy Michael P Andersen Bradford Campbell David Culler Prabal Dutta Branden Ghena Philip Levis Pat Pannuto October 4th, 2015

ownership is theft: experiences building an embedded os in rust Amit Levy Michael P Andersen Bradford Campbell David Culler Prabal Dutta Branden Ghena Philip Levis Pat Pannuto October 4th, 2015

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2015-10-04 17:59:18
    42Citation: Pitaru, Amit. “E Is for Everyone: The Case for Inclusive Game Design.

    Citation: Pitaru, Amit. “E Is for Everyone: The Case for Inclusive Game Design." The Ecology of Games: Connecting Youth, Games, and Learning. Edited by Katie Salen. The John D. and Catherine T. MacArthur Foundation Ser

    Add to Reading List

    Source URL: mitpress2.mit.edu

    Language: English - Date: 2010-11-19 11:31:55
      43Non-Uniform Subset Selection for Active Learning in Structured Data Sujoy Paul, Jawadul H. Bappy and Amit Roy-Chowdhury Department of Electrical and Computer Engineering, University of California, Riverside, CA 92521 {su

      Non-Uniform Subset Selection for Active Learning in Structured Data Sujoy Paul, Jawadul H. Bappy and Amit Roy-Chowdhury Department of Electrical and Computer Engineering, University of California, Riverside, CA 92521 {su

      Add to Reading List

      Source URL: www.ee.ucr.edu

      - Date: 2017-04-17 15:29:07
        44Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google’s Datacenter Network Arjun Singh, Joon Ong, Amit Agarwal, Glen Anderson, Ashby Armistead, Roy Bannon, Seb Boving, Gaurav Desai, Bob Felderma

        Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google’s Datacenter Network Arjun Singh, Joon Ong, Amit Agarwal, Glen Anderson, Ashby Armistead, Roy Bannon, Seb Boving, Gaurav Desai, Bob Felderma

        Add to Reading List

        Source URL: rule11.tech

        - Date: 2017-03-01 23:55:24
          45Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh1 , Kevin Lewi1 , Mariana Raykova2 , Amit Sahai3 , Mark Zhandry1 , and Joe Zimmerman1 1  Stanford University

          Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh1 , Kevin Lewi1 , Mariana Raykova2 , Amit Sahai3 , Mark Zhandry1 , and Joe Zimmerman1 1 Stanford University

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2015-05-25 22:53:51
            46Szabadnak lenni  - Az légy aki akarsz! - Azt tehess amit akarsz! - Legyen meg mindened amit akarsz!

            Szabadnak lenni - Az légy aki akarsz! - Azt tehess amit akarsz! - Legyen meg mindened amit akarsz!

            Add to Reading List

            Source URL: metabond.extra.hu

            - Date: 2012-12-25 09:09:52
              47Patchable Obfuscation Prabhanjan Ananth∗ Abhishek Jain†  Amit Sahai‡

              Patchable Obfuscation Prabhanjan Ananth∗ Abhishek Jain† Amit Sahai‡

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2015-11-08 05:53:42
                48A Extracting City Traffic Events from Social Streams Pramod Anantharam, Wright State University Payam Barnaghi, University of Surrey Krishnaprasad Thirunarayan, Wright State University Amit Sheth, Wright State University

                A Extracting City Traffic Events from Social Streams Pramod Anantharam, Wright State University Payam Barnaghi, University of Surrey Krishnaprasad Thirunarayan, Wright State University Amit Sheth, Wright State University

                Add to Reading List

                Source URL: knoesis.org

                - Date: 2015-12-10 11:03:07
                  49Black-Box Separations for Differentially Private Protocols∗ Dakshita Khurana† Hemanta K. Maji†  Amit Sahai†

                  Black-Box Separations for Differentially Private Protocols∗ Dakshita Khurana† Hemanta K. Maji† Amit Sahai†

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2014-11-23 05:56:27
                    50Secure Arithmetic Computation with No Honest Majority Yuval Ishai ∗ Manoj Prabhakaran †  Amit Sahai ‡

                    Secure Arithmetic Computation with No Honest Majority Yuval Ishai ∗ Manoj Prabhakaran † Amit Sahai ‡

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2008-11-08 12:56:54