David Thomas

Results: 1142



#Item
161Jitsu: Just-In-Time Summoning of Unikernels Anil Madhavapeddy, Thomas Leonard, Magnus Skjegstad, Thomas Gazagnaire, and David Sheets, University of Cambridge; Dave Scott, Citrix Systems UK Ltd.; Richard Mortier, Amir Cha

Jitsu: Just-In-Time Summoning of Unikernels Anil Madhavapeddy, Thomas Leonard, Magnus Skjegstad, Thomas Gazagnaire, and David Sheets, University of Cambridge; Dave Scott, Citrix Systems UK Ltd.; Richard Mortier, Amir Cha

Add to Reading List

Source URL: www.usenix.org

Language: English
    162MINUTES July 23, 2014 Thomas J. Peachey Center, Front Royal, VA MEMBERS PRESENT: Mr. Jack Alkire, Mr. Tom Brubaker, Mr. Ryan Clouse, Dr. Philip Pate, Ms. Joan Richardson, Ms. Celie Harris, Rev. David Howard, Ms. Dominika

    MINUTES July 23, 2014 Thomas J. Peachey Center, Front Royal, VA MEMBERS PRESENT: Mr. Jack Alkire, Mr. Tom Brubaker, Mr. Ryan Clouse, Dr. Philip Pate, Ms. Joan Richardson, Ms. Celie Harris, Rev. David Howard, Ms. Dominika

    Add to Reading List

    Source URL: www.nwcsb.com

    Language: English - Date: 2015-02-06 12:46:06
      163CASADESUS-ENHCO TRIO Caroline Casadesus (voix) – Thomas Enhco (piano) – David Enhco (trompette, bugle) Contrat technique de 2 pages Les pages de ce contrat technique sont absolument indissociables du contrat de cessi

      CASADESUS-ENHCO TRIO Caroline Casadesus (voix) – Thomas Enhco (piano) – David Enhco (trompette, bugle) Contrat technique de 2 pages Les pages de ce contrat technique sont absolument indissociables du contrat de cessi

      Add to Reading List

      Source URL: www.davidenhco.com

      Language: French - Date: 2012-11-05 04:01:14
        164Reverse Engineering the Internet Neil Spring, David Wetherall, and Thomas Anderson Department of Computer Science and Engineering, University of Washington ficient network measurement techniques make this possible. For e

        Reverse Engineering the Internet Neil Spring, David Wetherall, and Thomas Anderson Department of Computer Science and Engineering, University of Washington ficient network measurement techniques make this possible. For e

        Add to Reading List

        Source URL: djw.cs.washington.edu

        Language: English - Date: 2003-11-02 23:48:09
          165Tracing Software Developers’ Eyes and Interactions for Change Tasks Katja Kevic† , Braden M. Walters* , Timothy R. Shaffer* , Bonita Sharif* , David C. Shepherd‡ , Thomas Fritz† †

          Tracing Software Developers’ Eyes and Interactions for Change Tasks Katja Kevic† , Braden M. Walters* , Timothy R. Shaffer* , Bonita Sharif* , David C. Shepherd‡ , Thomas Fritz† †

          Add to Reading List

          Source URL: www.zora.uzh.ch

          Language: English - Date: 2015-08-18 19:15:15
            166GridTPT: a distributed platform for Theorem Prover Testing∗ Thomas Bouton Diego Caminha B. de Oliveira David D´eharbe Pascal Fontaine

            GridTPT: a distributed platform for Theorem Prover Testing∗ Thomas Bouton Diego Caminha B. de Oliveira David D´eharbe Pascal Fontaine

            Add to Reading List

            Source URL: www.montefiore.ulg.ac.be

            Language: English - Date: 2011-03-31 07:54:02
              167Power and Bias of Subset Pooling Strategies Gordon V. Cormack and Thomas R. Lynam David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada

              Power and Bias of Subset Pooling Strategies Gordon V. Cormack and Thomas R. Lynam David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada

              Add to Reading List

              Source URL: plg.uwaterloo.ca

              Language: English - Date: 2008-02-23 09:42:16
              168Analysing Security-related Signals Using Softwaredefined Radio Thomas Rudolph Bachelor’s Thesis. February 12, 2013. Chair for Embedded Security – Prof. Dr.-Ing. Christof Paar Advisor: Dipl.-Ing. David Oswald

              Analysing Security-related Signals Using Softwaredefined Radio Thomas Rudolph Bachelor’s Thesis. February 12, 2013. Chair for Embedded Security – Prof. Dr.-Ing. Christof Paar Advisor: Dipl.-Ing. David Oswald

              Add to Reading List

              Source URL: www.emsec.rub.de

              Language: English - Date: 2014-02-28 12:00:15
                169Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter Thomas Anderson, Arvind Krishnamurthy, David Wetherall University of Washington  {syhan, vincent, qp, simpeter, tom, arvind, dj

                Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter Thomas Anderson, Arvind Krishnamurthy, David Wetherall University of Washington {syhan, vincent, qp, simpeter, tom, arvind, dj

                Add to Reading List

                Source URL: homes.cs.washington.edu

                Language: English - Date: 2013-06-25 18:48:39
                  170Detecting Insider Threats in a Real Corporate Database of Computer Usage Activity Ted E. Senator, Henry G. David A.Bader, Edmond Chow, Thomas G. Dietterich, Alan Goldberg, Alex Memory, Irfan Essa, Joshua Jones,

                  Detecting Insider Threats in a Real Corporate Database of Computer Usage Activity Ted E. Senator, Henry G. David A.Bader, Edmond Chow, Thomas G. Dietterich, Alan Goldberg, Alex Memory, Irfan Essa, Joshua Jones,

                  Add to Reading List

                  Source URL: www.cc.gatech.edu

                  Language: English - Date: 2013-06-03 22:19:16