Engineering

Results: 482474



#Item
1Cryptography / Computational complexity theory / Complexity classes / Interactive proof system / Zero-knowledge proof / NP / Probabilistically checkable proof / IP / Soundness / Commitment scheme / NEXPTIME / P versus NP problem

The Complexity of Zero Knowledge Salil Vadhan∗ School of Engineering and Applied Sciences Harvard University Cambridge, MA 02138

Add to Reading List

Source URL: people.seas.harvard.edu

Language: English - Date: 2010-03-21 22:20:21
2Student exchange / Education / Culture / Human behavior / Carnegie Mellon University / Carnegie Mellon Silicon Valley / International student / Host family / Kigali

Host Family Program Carnegie Mellon University-Africa is proud to announce the launch of a Host Family Program for International Students in our Kigali Campus. Host family is a vital part of a cultural exchange, immersin

Add to Reading List

Source URL: www.africa.engineering.cmu.edu

Language: English - Date: 2018-09-12 05:46:12
3Software engineering / Computing / Software requirements / Modeling languages / Systems engineering / Systems analysis / Enterprise modelling / KAOS / Planning Domain Definition Language / I* / Diagram / Use case

Using GORE method for Requirement Engineering of Planning & Scheduling Javier Martnez Silva Department of Mechatronics Engineering University of S˜ao Paulo, S˜ao Paulo, Brazil, Professor Morais, 2231

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-09 08:09:34
4Functions and mappings / Mathematical analysis / Mathematics / Computer arithmetic / Limit of a function / Abstract interpretation / Unit in the last place / Exponentiation / Integral / Lambda calculus / Quantifier / Combinatory logic

Int. J. of Intelligent Engineering Informatics, Vol. x, No. x, 1–26 Numerical Program Optimization by Automatic Improvement of the Accuracy of Computations Nasrine Damouche* and Matthieu Martel Universit´e de Perpign

Add to Reading List

Source URL: perso.univ-perp.fr

Language: English - Date: 2018-01-15 07:35:42
5Computing / Software engineering / Computer programming / Carnegie Mellon University / Carnegie Mellon Silicon Valley / Abstract interpretation / Mellon / Scala / Refinement

Vinta: Verification with INTerpolation and Abstract iterpretation Arie Gurfinkel Software Engineering Institute Carnegie Mellon University

Add to Reading List

Source URL: arieg.bitbucket.io

Language: English - Date: 2018-10-19 18:15:18
6

Leveraging Gate-Level Properties to Identify Hardware Timing Channels Jason Oberg∗ , Sarah Meiklejohn∗ , Timothy Sherwood† and Ryan Kastner∗ ∗ Computer Science and Engineering, University of California, San Di

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
    7

    Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:58:45
      8Computer programming / Software engineering / Computing / Cross-platform software / High-level programming languages / Object-oriented programming languages / Build automation / Compiling tools / Python / SCons / C++ / Comment

      Learning gem5 – Part II Modifying and Extending gem5 Jason Lowe-Power http://learning.gem5.org/ https://faculty.engineering.ucdavis.edu/lowepower/

      Add to Reading List

      Source URL: learning.gem5.org

      Language: English - Date: 2018-09-17 11:50:25
      9Computer network security / Cyberwarfare / Computing / Security engineering / Honeypot / Computer security / Virtual machine / VMware / Internet privacy / Honeyd / Client honeypot

      Imperial College London Department of Electrical and Electronic Engineering MEng Individual Project Project Title:

      Add to Reading List

      Source URL: www.doc.ic.ac.uk

      Language: English - Date: 2016-01-21 09:17:57
      10Computer security / Computing / Cyberwarfare / Computer network security / Security engineering / Crime prevention / Cryptography / National security / Threat model / Threat / STRIDE / Information security

      Threat modeling, incident command, & DDoS mitigation Maarten Van Horenbeeck Vp of Security Engineering, Fastly Dr. Jose Nazario

      Add to Reading List

      Source URL: www.fastly.com

      Language: English - Date: 2018-01-30 17:52:40
      UPDATE