<--- Back to Details
First PageDocument Content
Khaled Hosseini / Fighter kite / Amir / Asia / Kites / The Kite Runner
Date: 2012-06-01 14:56:57
Khaled Hosseini
Fighter kite
Amir
Asia
Kites
The Kite Runner

2010 Online Book Groups       Syllabus for The Kite Runner Online Book Discussion Group 

Add to Reading List

Source URL: centerforlearning.org

Download Document from Source Website

File Size: 159,67 KB

Share Document on Facebook

Similar Documents

Internet / Computing / Cyberwarfare / Internet security / Computer network security / Internet Standards / Internet protocols / Transmission Control Protocol / Denial-of-service attack / TCP reset attack / IP address spoofing / Internet protocol suite

1 Off-Path Hacking: The Illusion of Challenge-Response Authentication Yossi Gilad∗‡ , Amir Herzberg†‡ , Haya Shulman§‡

DocID: 1xUUI - View Document

Digital media / World Wide Web / Wikipedia reliability / Social information processing / Wikipedia / Wikimedia projects / Mass media / Hypertext / Wiki / Vandalism on Wikipedia / Academic studies about Wikipedia

Building Automated Vandalism Detection Tools for Wikidata Amir Sarabadani Aaron Halfaker

DocID: 1xUHx - View Document

Cryptocurrencies / Bitcoin / Computing / Alternative currencies / Emerging technologies / Decentralization / Economy / Money / Blockchain / Bloom filter / Graphene / Potential applications of graphene

Graphene: A New Protocol for Block Propagation Using Set Reconciliation A. Pinar Ozisik† , Gavin Andresen, George Bissias† , Amir Houmansadr† , Brian Levine† †College of Information and Computer Sciences, Univ.

DocID: 1xUzi - View Document

Computing / Network architecture / Internet architecture / Information and communications technology / Internet Standards / Computer networking / Routing protocols / Routing / Border Gateway Protocol / Router / Computer network / IP routing

No Direction Home: The True Cost of Routing Around Decoys Amir Houmansadr Edmund L. Wong∗

DocID: 1xU3F - View Document

CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content John Holowczak and Amir Houmansadr College of Information and Computer Sciences University of Massachusetts Amherst

DocID: 1xTmX - View Document