Computer

Results: 301026



#Item
131Look Before You Shame: A Study on Shaming Activities on Twitter Rajesh Basak, Niloy Ganguly, Shamik Sural, Soumya K Ghosh Department of Computer Science & Engineering, Indian Institute of Technology Kharagpur Kharagpur,

Look Before You Shame: A Study on Shaming Activities on Twitter Rajesh Basak, Niloy Ganguly, Shamik Sural, Soumya K Ghosh Department of Computer Science & Engineering, Indian Institute of Technology Kharagpur Kharagpur,

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:23:08
132Planning with Concurrent Execution Bence Cserna Department of Computer Science University of New Hampshire Durham, NHUSA

Planning with Concurrent Execution Bence Cserna Department of Computer Science University of New Hampshire Durham, NHUSA

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-09 08:09:24
133die datenschleuder. das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Byebyecicle.

die datenschleuder. das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Byebyecicle.

Add to Reading List

Source URL: ds.ccc.de

Language: German - Date: 2006-03-09 18:28:21
    134The Social Effects of Keitai and Personal Computer E-mail in Japan1 Kakuko Miyata, Jeffrey Boase, and Barry Wellman Draft March 28, 2006

    The Social Effects of Keitai and Personal Computer E-mail in Japan1 Kakuko Miyata, Jeffrey Boase, and Barry Wellman Draft March 28, 2006

    Add to Reading List

    Source URL: individual.utoronto.ca

    Language: English - Date: 2017-09-21 13:37:57
    135Die Datenschleuder Das wissenschaftliche Fachblatt für Datenreisende Ein Organ des Chaos Computer Club Nahrung für die Desinformationsgesellschaft

    Die Datenschleuder Das wissenschaftliche Fachblatt für Datenreisende Ein Organ des Chaos Computer Club Nahrung für die Desinformationsgesellschaft

    Add to Reading List

    Source URL: ds.ccc.de

    Language: German - Date: 2006-03-14 18:32:57
      136Graphene: A New Protocol for Block Propagation Using Set Reconciliation A. Pinar Ozisik† , Gavin Andresen, George Bissias† , Amir Houmansadr† , Brian Levine† †College of Information and Computer Sciences, Univ.

      Graphene: A New Protocol for Block Propagation Using Set Reconciliation A. Pinar Ozisik† , Gavin Andresen, George Bissias† , Amir Houmansadr† , Brian Levine† †College of Information and Computer Sciences, Univ.

      Add to Reading List

      Source URL: people.cs.umass.edu

      Language: English - Date: 2017-09-14 05:26:43
      137An Algorithmic Framework for Synthesis of Concurrent Programs E. Allen Emerson and Roopsha Samanta Dept. of Computer Science and Computer Engineering Research Centre, University of Texas, Austin, TX 78712, USA. {emerson,

      An Algorithmic Framework for Synthesis of Concurrent Programs E. Allen Emerson and Roopsha Samanta Dept. of Computer Science and Computer Engineering Research Centre, University of Texas, Austin, TX 78712, USA. {emerson,

      Add to Reading List

      Source URL: www.cs.purdue.edu

      Language: English - Date: 2016-07-15 23:00:36
      138Secure PRNGs from Specialized Polynomial Maps over Any Fq Feng-Hao Liu1 , Chi-Jen Lu2 , and Bo-Yin Yang2 1  Department of Computer Science, Brown University, Providence RI, USA

      Secure PRNGs from Specialized Polynomial Maps over Any Fq Feng-Hao Liu1 , Chi-Jen Lu2 , and Bo-Yin Yang2 1 Department of Computer Science, Brown University, Providence RI, USA

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2012-03-10 01:26:44
      139Sentinel Protocol Security Intelligence Platform for Blockchain Abstract The rapid development of computer technology in the 21st century has led to the manifestation of sophisticated and intelligent threats that

      Sentinel Protocol Security Intelligence Platform for Blockchain Abstract The rapid development of computer technology in the 21st century has led to the manifestation of sophisticated and intelligent threats that

      Add to Reading List

      Source URL: s3-ap-southeast-1.amazonaws.com

      Language: English - Date: 2018-10-12 03:26:38
      140Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu  Ab

      Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-05-14 06:12:20