C.

Results: 504177



#Item
261Characteristics of four illustrative model pathways Different mitigation strategies can achieve the net emissions reductions that would be required to follow a pathway that limits global warming to 1.5°C with no or limi

Characteristics of four illustrative model pathways Different mitigation strategies can achieve the net emissions reductions that would be required to follow a pathway that limits global warming to 1.5°C with no or limi

Add to Reading List

Source URL: ipcc.ch

Language: English - Date: 2018-10-15 09:46:52
262An Operational Semantics for JavaScript? Sergio Maffeis1 , John C. Mitchell2 , Ankur Taly2 , 1 2  Department of Computing, Imperial College London

An Operational Semantics for JavaScript? Sergio Maffeis1 , John C. Mitchell2 , Ankur Taly2 , 1 2 Department of Computing, Imperial College London

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
263S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

S AFE D ISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks Dongseok Jang Zachary Tatlock

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2018-10-18 11:22:47
264c 
Copyright 2014 Colin S. Gordon  Verifying Concurrent Programs by Controlling Alias Interference

c Copyright 2014 Colin S. Gordon Verifying Concurrent Programs by Controlling Alias Interference

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-22 12:11:10
265DATE FILED: May 4, 2018  Colorado Supreme Court 2 East 14th Avenue Denver, COOriginal Proceeding Pursuant to §), C.R.S)

DATE FILED: May 4, 2018 Colorado Supreme Court 2 East 14th Avenue Denver, COOriginal Proceeding Pursuant to §), C.R.S)

Add to Reading List

Source URL: www.courts.state.co.us

Language: English - Date: 2018-05-07 11:32:12
266Privacy Policy Effective date: 21 May 2018 This is the privacy policy (

Privacy Policy Effective date: 21 May 2018 This is the privacy policy ("​Privacy Policy​") for information collected by GV Management Company, L.L.C. or GV UK Management Company Limited (together “​GV​”) and

Add to Reading List

Source URL: www.gv.com

Language: English - Date: 2018-10-11 17:01:09
267Terms and Conditions By purchasing goods from NBN International or its partners the customer accepts the terms herein. NBN International or its partners: 1. Will keep the customer informed of changes to these Terms and C

Terms and Conditions By purchasing goods from NBN International or its partners the customer accepts the terms herein. NBN International or its partners: 1. Will keep the customer informed of changes to these Terms and C

Add to Reading List

Source URL: distribution.nbni.co.uk

Language: English - Date: 2016-07-08 09:00:14
268Leveraging Internet Background Radiation for Opportunistic Network Analysis Karyn Benson∗† , Alberto Dainotti† , kc claffy† , Alex C. Snoeren∗ , Michael Kallitsis‡ ∗  Computer Science and Engineering, UC Sa

Leveraging Internet Background Radiation for Opportunistic Network Analysis Karyn Benson∗† , Alberto Dainotti† , kc claffy† , Alex C. Snoeren∗ , Michael Kallitsis‡ ∗ Computer Science and Engineering, UC Sa

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2018-09-13 19:48:51
    269Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

    Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

    Add to Reading List

    Source URL: eftychis.org

    Language: English - Date: 2018-02-16 15:03:09
    270SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit Cormac Herley P.C. van Oorschot

    SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit Cormac Herley P.C. van Oorschot

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:02:01