41![Learning to Decipher the Heap for Program Verification Marc Brockschmidt1 , Yuxin Chen2 , Byron Cook3 , Pushmeet Kohli1 , Daniel Tarlow1 1 Microsoft Research 2 ETH Zurich 3 University College London Learning to Decipher the Heap for Program Verification Marc Brockschmidt1 , Yuxin Chen2 , Byron Cook3 , Pushmeet Kohli1 , Daniel Tarlow1 1 Microsoft Research 2 ETH Zurich 3 University College London](https://www.pdfsearch.io/img/0b56a5586575abc0b8acf40d407658c1.jpg) | Add to Reading ListSource URL: www.cs.toronto.eduLanguage: English - Date: 2016-06-04 11:31:07
|
---|
42![](/pdf-icon.png) | Add to Reading ListSource URL: www.saramitchell.orgLanguage: English - Date: 2009-07-21 12:23:20
|
---|
43![All Your Cards Are Belong To Us: Understanding Online Carding Forums Andreas Haslebacher, Jeremiah Onaolapo, and Gianluca Stringhini University College London {j.onaolapo,g.stringhini}@cs All Your Cards Are Belong To Us: Understanding Online Carding Forums Andreas Haslebacher, Jeremiah Onaolapo, and Gianluca Stringhini University College London {j.onaolapo,g.stringhini}@cs](https://www.pdfsearch.io/img/96379f3bc867e2f89573196bec720344.jpg) | Add to Reading ListSource URL: jonaolapo.github.ioLanguage: English - Date: 2018-10-25 12:11:25
|
---|
44![REPETITA: Repeatable Experiments for Performance Evaluation of Traffic-Engineering Algorithms Steven Gay ∗, Pierre Schaus ∗, Stefano Vissicchio † ∗ Universite catholique de Louvain, † University College London REPETITA: Repeatable Experiments for Performance Evaluation of Traffic-Engineering Algorithms Steven Gay ∗, Pierre Schaus ∗, Stefano Vissicchio † ∗ Universite catholique de Louvain, † University College London](https://www.pdfsearch.io/img/a00e050a5129cfe461861edcd5b16a7b.jpg) | Add to Reading ListSource URL: arxiv.orgLanguage: English - Date: 2017-10-24 20:49:21
|
---|
45![Language-Based Isolation of Untrusted JavaScript Sergio Maffeis Department of Computing Imperial College London London, UK Email: Language-Based Isolation of Untrusted JavaScript Sergio Maffeis Department of Computing Imperial College London London, UK Email:](https://www.pdfsearch.io/img/29b813ca7fd198e20211fc5e1ef07940.jpg) | Add to Reading ListSource URL: www.doc.ic.ac.ukLanguage: English - Date: 2012-08-10 13:17:44
|
---|
46![The Movement of Air, the Breath of Meaning: Aurality and Multimodal Composing Author(s): Cynthia L. Selfe Source: College Composition and Communication, Vol. 60, No. 4 (JUNE 2009), ppPublished by: National Coun The Movement of Air, the Breath of Meaning: Aurality and Multimodal Composing Author(s): Cynthia L. Selfe Source: College Composition and Communication, Vol. 60, No. 4 (JUNE 2009), ppPublished by: National Coun](https://www.pdfsearch.io/img/ae6fea2546d45f0a925beafcf14d0e0c.jpg) | Add to Reading ListSource URL: www.dmacinstitute.comLanguage: English - Date: 2015-03-04 02:07:57
|
---|
47![A Scalable Smart Contracts Platform ! Shehar Bano ! Postdoc, InfoSec group! University College London! A Scalable Smart Contracts Platform ! Shehar Bano ! Postdoc, InfoSec group! University College London!](https://www.pdfsearch.io/img/9c5fdd2d00fc7d748db96b75c86dfd4e.jpg) | Add to Reading ListSource URL: sheharbano.comLanguage: English - Date: 2018-03-25 05:42:40
|
---|
48![Graphene: A New Protocol for Block Propagation Using Set Reconciliation A. Pinar Ozisik† , Gavin Andresen, George Bissias† , Amir Houmansadr† , Brian Levine† †College of Information and Computer Sciences, Univ. Graphene: A New Protocol for Block Propagation Using Set Reconciliation A. Pinar Ozisik† , Gavin Andresen, George Bissias† , Amir Houmansadr† , Brian Levine† †College of Information and Computer Sciences, Univ.](https://www.pdfsearch.io/img/f5bf283aef09918a9dfbd3efa69a97e2.jpg) | Add to Reading ListSource URL: people.cs.umass.eduLanguage: English - Date: 2017-09-14 05:26:43
|
---|
49![What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild Jeremiah Onaolapo, Enrico Mariconti, and Gianluca Stringhini University College London {j.onaolapo, e.mariconti, g.stringhi What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild Jeremiah Onaolapo, Enrico Mariconti, and Gianluca Stringhini University College London {j.onaolapo, e.mariconti, g.stringhi](https://www.pdfsearch.io/img/b28256c8b2fb1c166e702a129c437903.jpg) | Add to Reading ListSource URL: jonaolapo.github.ioLanguage: English - Date: 2018-10-25 12:11:25
|
---|
50![Transparency Overlays and Applications Melissa Chase (Microsoft Research Redmond) Sarah Meiklejohn (University College London)
(icons by parkjisun from noun project) Transparency Overlays and Applications Melissa Chase (Microsoft Research Redmond) Sarah Meiklejohn (University College London)
(icons by parkjisun from noun project)](https://www.pdfsearch.io/img/6c051f58805e3da5dfc91f43512d646f.jpg) | Add to Reading ListSource URL: smeiklej.com- Date: 2018-10-23 14:58:02
|
---|