Burrows

Results: 539



#Item
341Formal languages / Mathematical logic / Cryptographic protocols / Semantics / Burrows–Abadi–Needham logic / Interpretation / First-order logic / Constructible universe / Ground expression / Logic / Mathematics / Model theory

Analysis of authentication protocols Intership report St´ephane Glondu ENS de Cachan∗ September 3, 2006

Add to Reading List

Source URL: stephane.glondu.net

Language: English - Date: 2006-09-03 17:53:44
342Battle of Blandford / Geography of the United States / Culpeper /  Virginia / Culpeper County /  Virginia / Virginia

Southern Campaign American Revolution Pension Statements & Rosters Pension Application of Michael Burruss S8111. See also Michael Burrows R1504. Transcribed and annotated by C. Leon Harris. Revised 1 May[removed]State of V

Add to Reading List

Source URL: revwarapps.org

Language: English - Date: 2012-05-01 21:48:54
343

Verlustlose Datenkompression auf Grundlage der Burrows-Wheeler-Transformation• JÜRGEN ABEL •• Universität Duisburg-Essen ________________________________________________________________________ Die verlustfreie D

Add to Reading List

Source URL: www.juergen-abel.info

Language: German - Date: 2010-01-02 12:34:40
    344Transforms / Move-to-front transform / Burrows–Wheeler transform / Run-length encoding / Lossless data compression / Suffix tree / Algorithm / Suffix array / Entropy encoding / Data compression / Information theory / Computing

    Improvements to the Burrows-Wheeler Compression Algorithm: After BWT Stages JUERGEN ABEL University Duisburg-Essen ________________________________________________________________________ The lossless Burrows-Wheeler Com

    Add to Reading List

    Source URL: www.juergen-abel.info

    Language: English - Date: 2010-01-02 12:33:45
    345Network protocols / Inter-process communication / File locking / Session / Proxy server / Peer-to-peer / Virtual synchrony / Consensus / Distributed file system / Computing / Network file systems / Fault-tolerant computer systems

    The Chubby lock service for loosely-coupled distributed systems Mike Burrows, Google Inc. Abstract We describe our experiences with the Chubby lock service, which is intended to provide coarse-grained locking as well as

    Add to Reading List

    Source URL: static.googleusercontent.com

    Language: English - Date: 2012-04-01 20:13:23
    346Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Communications protocol / Model theory / Quantifier elimination / Security protocol notation / Cryptographic protocols / Data / Information

    A (restricted) quantifier elimination for security protocols ? R. Ramanujam ∗ The Institute of Mathematical Sciences, C.I.T. Campus, Taramani, Chennai[removed], India S.P. Suresh

    Add to Reading List

    Source URL: www.imsc.res.in

    Language: English - Date: 2006-08-04 05:49:00
    347Bzip2 / Cross-platform software / Burrows–Wheeler transform / Move-to-front transform / Huffman coding / Run-length encoding / Entropy encoding / Arithmetic coding / Code / Data compression / Transforms / Archive formats

    Incremental Frequency Count – A post BWT-stage for the Burrows-Wheeler Compression Algorithm Jürgen Abel Ingenieurbüro Dr. Abel GmbH,

    Add to Reading List

    Source URL: www.juergen-abel.info

    Language: English - Date: 2010-01-02 12:34:20
    348

    Southern Campaign American Revolution Pension Statements & Rosters Pension Application of Michael Burrows R1504. See also Michael Burruss S8111. Transcribed and annotated by C. Leon Harris State of Missouri } Sct. County

    Add to Reading List

    Source URL: revwarapps.org

    Language: English - Date: 2012-05-01 21:48:50
      349

      Grundlagen des Burrows-Wheeler-Kompressionsalgorithmus JÜRGEN ABEL • Universität Duisburg-Essen __________________________________________________________________________________________ Der Burrows-Wheeler-Kompressi

      Add to Reading List

      Source URL: www.juergen-abel.info

      Language: German - Date: 2010-01-02 12:34:14
        350Trusted computing base / Principal / Authorization / Authentication / Security / Computer security / Computer network security

        Authentication in Distributed Systems: Theory and Practice BUTLER LAMPSON, MARTÍN ABADI, MICHAEL BURROWS, and EDWARD WOBBER Digital Equipment Corporation

        Add to Reading List

        Source URL: research.microsoft.com

        Language: English - Date: 1996-05-11 01:53:14
        UPDATE