Available

Results: 72005



#Item
11Social information processing / Wikipedia reliability / Collaboration / Digital media / WikiTrust / Wiki / Vandalism / World Wide Web / TW

Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

Add to Reading List

Source URL: snap.stanford.edu

Language: English - Date: 2017-04-03 00:39:08
12Quantum information science / Theoretical computer science / Quantum mechanics / Quantum computing / Quantum error correction / Qubit / Quantum circuit / Stabilizer code / Quantum threshold theorem / Superdense coding / Quantum logic gate / Superconducting quantum computing

Lecture 27, Thurs April 27: Quantum Error Correction At the end of the last lecture, we discussed some of the difficulties with achieving a quantum speedup using currently available quantum computing devices, like D-Wave

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-08-26 18:23:59
13Economy / International macroeconomics / Investment / Stock market crashes / Monetary policy / Great Recession / Emerging market / Asian financial crisis / Carry / Foreign-exchange reserves / Financial crisis of 20072008 / Exchange rate

HALF-YEARLY MONETARY AND FINANCIAL STABILITY REPORT June 2006 This Report relies on statistical information available by end-May 2006.

Add to Reading List

Source URL: www.hkma.gov.hk

Language: English - Date: 2018-02-01 20:47:17
14Computing / Sponsor / ACM/IEEE Supercomputing Conference

Join us in Bamberg We would like to extend an invitation to your company to be part of the NAFEMS DACH ConferenceThere are several outstanding opportunities available for your company to sponsor or exhibit at the

Add to Reading List

Source URL: www.nafems.org

Language: English - Date: 2013-12-09 04:54:35
15Cryptography / Cryptographic hash functions / Post-quantum cryptography / Hashing / XMSS / HMAC / SHA-2 / Hash function / Crypt / Hash-based cryptography

Differential Power Analysis of XMSS and SPHINCS Matthias J. Kannwischer, Full paper available at kannwischer.eu

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-11 11:26:21
16

Fudge System Reference Document This document contains information on the Fudge roleplaying game system, and presents the core body of the Fudge RPG material available for use under the Open Game License. Copyrights, Tra

Add to Reading List

Source URL: wanderinghorse.net

Language: English - Date: 2018-10-25 11:40:39
    17Mathematics / Algebra / Abstract algebra / Homotopy theory / Differential geometry / Symmetry / Category theory / Vector bundles / Lie algebroid / Lie groupoid / Groupoid / Group action

    Advances in Mathematics–91 Contents lists available at ScienceDirect Advances in Mathematics www.elsevier.com/locate/aim

    Add to Reading List

    Source URL: math.univ-bpclermont.fr

    Language: English - Date: 2018-03-05 11:11:23
    18Film / Tencent / Entertainment / Cinema of the United States / The Walt Disney Company / Star Wars / WeChat / Walt Disney Parks and Resorts / QQ Games / Qzone / 20th Century Fox / Ma Huateng

    The entire Star Wars saga now available on Tencent’s platform in China With less than hundred days to go until the global release of Star Wars: The Force Awakens in December 2015, hundreds of millions of mainland Chine

    Add to Reading List

    Source URL: www.tencent.com

    Language: English - Date: 2018-07-12 03:03:11
    19

    NeuroImage–18 Contents lists available at ScienceDirect NeuroImage journal homepage: www.elsevier.com/locate/neuroimage

    Add to Reading List

    Source URL: saxelab.mit.edu

    Language: English - Date: 2017-09-12 16:37:55
      20Algebra / Abstract algebra / Mathematics / Group theory / Linear algebra / Pairing-based cryptography / Subgroup / Pairing / XTR / Generalized flag variety

      Full version of an extended abstract published in Proceedings of PKC 2015, Springer-Verlag, 2015. Available from the IACR Cryptology ePrint Archive as ReportA Profitable Sub-Prime Loan: Obtaining the Advantage

      Add to Reading List

      Source URL: smeiklej.com

      Language: English - Date: 2018-10-23 14:58:02
      UPDATE