Computer University

Results: 29298



#Item
801

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Add to Reading List

Source URL: www.cs.bham.ac.uk.

Language: English - Date: 2009-02-25 10:33:24
    802

    High-Performance Symbolic Computation in a Hybrid Compiled-Interpreted Programming Environment Xin Li Ontario Research Center for Computer Algebra University of Western Ontario London, Ontario, Canada

    Add to Reading List

    Source URL: cs.uwaterloo.ca

    Language: English - Date: 2015-10-14 23:46:34
      803

      Incremental SPARQL Evaluation for Query Answering on Linked Data Florian Schmedding Department of Computer Science Albert Ludwig University of Freiburg, Germany

      Add to Reading List

      Source URL: ceur-ws.org

      Language: English - Date: 2011-09-23 13:28:47
        804

        Basic Fortran Support in Legion Adam J Ferrari and Andrew S. Grimshaw Department of Computer Science, University of Virginia Technical Report CSMarch 4, 1998 Abstract

        Add to Reading List

        Source URL: www.cs.virginia.edu

        Language: English - Date: 1998-12-07 09:58:27
          805

          Evaluating Unexpected Change in a Distributed Collection Luis Meneses, Richard Furuta and Frank Shipman Center for the Study of Digital Libraries and Department of Computer Science and Engineering Texas A&M University Co

          Add to Reading List

          Source URL: www.ieee-tcdl.org

          Language: English - Date: 2017-03-18 19:55:22
            806

            A birthday present every eleven wallets? The security of customer-chosen banking PINs Joseph Bonneau, S¨oren Preibusch, Ross Anderson Computer Laboratory University of Cambridge {jcb82,sdp36,rja14}@cl.cam.ac.uk

            Add to Reading List

            Source URL: preibusch.de

            Language: English - Date: 2012-03-06 07:30:26
              807Wireless networking / Computer network security / Computer security / Computing / Cryptography / Cryptographic protocols / IEEE 802.11 / Computer access control / Extensible Authentication Protocol / Wired Equivalent Privacy / Authentication protocol / Integrated Windows Authentication

              YourWireless Network has No Clothes∗ William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland

              Add to Reading List

              Source URL: www.cs.umd.edu

              Language: English - Date: 2001-08-11 18:26:34
              808

              The Role of Trust in Decision-Making for Human Robot Collaboration Min Chen∗1 , Stefanos Nikolaidis†1 , Harold Soh∗ , David Hsu∗ and Siddhartha Srinivasa† ∗ Department of Computer Science, National University

              Add to Reading List

              Source URL: www.stefanosnikolaidis.net

              Language: English - Date: 2017-08-11 16:15:35
                809

                Weighted Synergy Graphs for Effective Team Formation with Heterogeneous Ad Hoc Agents Somchaya Liemhetcharat∗ and Manuela Veloso School of Computer Science, Carnegie Mellon University Pittsburgh, PA 15213, USA som@ri.c

                Add to Reading List

                Source URL: www.somchaya.org

                Language: English - Date: 2017-04-09 23:30:42
                  810

                  Replaying IDE Interactions to Evaluate and Improve Change Prediction Approaches Romain Robbes Computer Science Department (DCC) University of Chile, Santiago, Chile Damien Pollet

                  Add to Reading List

                  Source URL: www.inf.usi.ch

                  Language: English - Date: 2010-03-12 01:47:41
                    UPDATE