Computer

Results: 301026



#Item
11Theoretical computer science / Logic in computer science / Programming language semantics / Operational semantics / Semantics / International Colloquium on Automata /  Languages and Programming / Nominal / Process calculi

Rule Formats for Nominal Operational Semantics A very short and informal introduction Luca Aceto Gran Sasso Science Institute, L’Aquila, and ICE-TCS, School of Computer Science, Reykjavik University

Add to Reading List

Source URL: tlt2017.di.unito.it

Language: English - Date: 2017-10-04 12:33:27
12

Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer Science and Engineering, University of California, San Di

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
    13Probability and statistics / Probability theory / Artificial intelligence / Machine learning / Computational statistics / Graphical models / Computational linguistics / Natural language processing / Conditional random field / Probabilistic programming language / Inference / Support vector machine

    Programming with “Big Code”: Lessons, Techniques and Applications Pavol Bielik1 , Veselin Raychev1 , and Martin Vechev1 1 Department of Computer Science, ETH Zurich, Switzerland

    Add to Reading List

    Source URL: files.sri.inf.ethz.ch

    Language: English - Date: 2018-09-05 10:56:02
    14Computing / Denial-of-service attacks / Cyberwarfare / Cybercrime / Botnets / Computer network security / Denial-of-service attack / Mirai / Internet of things / Low Orbit Ion Cannon / Universal Plug and Play / Computer security

    EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2016-11-21 18:50:20
    15Software / Computing / Digital media / Internet search engines / Geosocial networking / Geographic information systems / Recommender system / Yelp / Local search / Geocoding / Personal /  Inc. / Database

    Improving Local Search with Open Geographic Data Chuankai An, Dan Rockmore Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA {chuankai, rockmore}@cs.dartmouth.edu ABSTRACT

    Add to Reading List

    Source URL: gdac.uqam.ca

    Language: English - Date: 2017-10-04 00:47:38
    16

    die datenschleuder . das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Y2HACK – Hacking in Israel EXPO 2000 “Spezial”

    Add to Reading List

    Source URL: ds.ccc.de

    Language: German - Date: 2006-03-14 18:33:04
      17Microsoft Windows / Windows Vista / Icon / Pictograms / Windows 7 / Draft:Nihilo Blockchain Introduction / Features new to Windows XP

      Steps to introduce VIPSTARCOIN wallets 1. Download a wallet program from the official website that is appropriate to your computer. 2. Unarchive the compressed file and run ‘VIPSTARCOIN-qt.exe’ in the folder.

      Add to Reading List

      Source URL: www.vipstarcoin.jp

      Language: English - Date: 2018-07-15 11:02:08
      18Mathematics / Computer arithmetic / Numerical analysis / Applied mathematics / Arithmetic / Interval arithmetic / Computer-assisted proof / Computational science / Scan

      SCAN 2018 Post-conference Proceedings Special Issue of Journal of Computational and Applied Mathematics Call for Papers Special Issue on the 18th International Symposium on Scientific Computing, Computer Arithmetic,

      Add to Reading List

      Source URL: scan2018.oishi.info.waseda.ac.jp

      Language: English - Date: 2018-09-08 22:45:08
      19

      Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2017-04-03 15:58:45
        20Cryptography / Digital signature / Random oracle / IP / Ibi / Schnorr signature

        A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

        Add to Reading List

        Source URL: www.neven.org

        Language: English - Date: 2012-04-18 06:07:38
        UPDATE