CS-Cipher

Results: 180



#Item
81M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

Add to Reading List

Source URL: www.uwosh.edu

Language: English - Date: 2014-05-22 14:12:29
82M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

Add to Reading List

Source URL: www.uwosh.edu

Language: English - Date: 2014-05-22 14:12:29
83Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems RICHARD D. SCHLICHTING University of Arizona and

Fail-Stop Processors: An Approach to Designing Fault-Tolerant Computing Systems RICHARD D. SCHLICHTING University of Arizona and

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-21 11:29:58
84S C H E D U L I N G IN C O N C U R R E N T P A S C A L * F. B. S c h n e i d e r A. J. B e r n s t e i n D e p a r t m e n t of C o m p u t e r S c i e n c e S.U.N.Y. at Stony Brook Stony Brook, New York, 11794

S C H E D U L I N G IN C O N C U R R E N T P A S C A L * F. B. S c h n e i d e r A. J. B e r n s t e i n D e p a r t m e n t of C o m p u t e r S c i e n c e S.U.N.Y. at Stony Brook Stony Brook, New York, 11794

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-21 13:57:16
85Chapter  9 Issues and Tools for P r o t o c o l Specification

Chapter 9 Issues and Tools for P r o t o c o l Specification

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-08-21 14:08:18
86Using Identity-Based Encryption to Eliminate Certificates in SSL Transactions

Using Identity-Based Encryption to Eliminate Certificates in SSL Transactions

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2002-07-18 00:26:34
87Practical Experiments with Regular Approximation of Context-Free Languages Mark-Jan Nederhof

Practical Experiments with Regular Approximation of Context-Free Languages Mark-Jan Nederhof" German Research Center for Artificial Intelligence

Add to Reading List

Source URL: www.cs.mun.ca

Language: English - Date: 2006-03-22 13:07:00
88M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

M A T H 201 APP L I E D ST A T IST I CS SPR I N G 2014 SE C T I O N[removed]

Add to Reading List

Source URL: www.uwosh.edu

Language: English - Date: 2014-05-22 14:12:29
89The Laws of Cryptography with Java Code by Neal R. Wagner  Copyright c 2003 by Neal R. Wagner. All rights reserved.

The Laws of Cryptography with Java Code by Neal R. Wagner Copyright c 2003 by Neal R. Wagner. All rights reserved.

Add to Reading List

Source URL: www.cs.utsa.edu

Language: English - Date: 2004-08-20 15:40:56
90  , @U? J ?EF9$9 7

 , @U? J ?EF9$9 7

Add to Reading List

Source URL: www.cs.engr.uky.edu

Language: English - Date: 1998-07-03 14:30:19