For Science

Results: 202039



#Item
71SIGCSE 2011 Poster Proposal: Universal Design for Learning in CS1 Suzanne Rivoire Department of Computer Science Sonoma State University, Rohnert Park, CA, USA

SIGCSE 2011 Poster Proposal: Universal Design for Learning in CS1 Suzanne Rivoire Department of Computer Science Sonoma State University, Rohnert Park, CA, USA

Add to Reading List

Source URL: rivoire.cs.sonoma.edu

Language: English - Date: 2017-05-29 18:45:15
72An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
73Learning Outcomes for the BSc in Business Administration with a minor in Computer Science  National Qualification Framework for Iceland

Learning Outcomes for the BSc in Business Administration with a minor in Computer Science National Qualification Framework for Iceland

Add to Reading List

Source URL: en.ru.is

Language: English - Date: 2017-12-05 04:50:57
74Automated Verification Techniques for Probabilistic Systems Vojtˇech Forejt1 , Marta Kwiatkowska1 , Gethin Norman2 , and David Parker1 1  Department of Computer Science, University of Oxford, Oxford, OX1 3QD, UK

Automated Verification Techniques for Probabilistic Systems Vojtˇech Forejt1 , Marta Kwiatkowska1 , Gethin Norman2 , and David Parker1 1 Department of Computer Science, University of Oxford, Oxford, OX1 3QD, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2013-10-06 19:34:00
75ProbReach: Probabilistic Bounded Reachability for Uncertain Hybrid Systems Fedor Shmarov, Paolo Zuliani School of Computing Science, Newcastle University, UK

ProbReach: Probabilistic Bounded Reachability for Uncertain Hybrid Systems Fedor Shmarov, Paolo Zuliani School of Computing Science, Newcastle University, UK

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2017-07-25 18:51:20
76Challenges for Fast Synthesis Procedures in SMT Andrew Reynolds1 Department of Computer Science, The University of Iowa Abstract A number of synthesis applications are made possible by automated tools for synthesis. Rece

Challenges for Fast Synthesis Procedures in SMT Andrew Reynolds1 Department of Computer Science, The University of Iowa Abstract A number of synthesis applications are made possible by automated tools for synthesis. Rece

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2017-07-30 15:10:48
77On behalf of our entire team at KNect365 Life Sciences, we want to thank you for joining us at BioProcess International 2018, part of Biotech Week Boston. We hope that you found value from the science, technologies and c

On behalf of our entire team at KNect365 Life Sciences, we want to thank you for joining us at BioProcess International 2018, part of Biotech Week Boston. We hope that you found value from the science, technologies and c

Add to Reading List

Source URL: download.knect365lifesciences.com

Language: English - Date: 2018-09-19 13:54:25
    78TimeMachine: Timeline Generation for Knowledge-Base Entities Tim Althoff*, Xin Luna Dong† , Kevin Murphy† , Safa Alai† , Van Dang† , Wei Zhang† *Computer Science Department, Stanford University, Stanford, CA 94

    TimeMachine: Timeline Generation for Knowledge-Base Entities Tim Althoff*, Xin Luna Dong† , Kevin Murphy† , Safa Alai† , Van Dang† , Wei Zhang† *Computer Science Department, Stanford University, Stanford, CA 94

    Add to Reading List

    Source URL: www.timalthoff.com

    Language: English - Date: 2015-06-08 17:23:54
      79A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

      A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

      Add to Reading List

      Source URL: cseweb.ucsd.edu

      Language: English - Date: 2006-08-14 17:10:52
      801  Postquantum SSL/TLS for embedded systems Yun-An Chang† , Ming-Shing Chen†‡ , Jong-shian Wu† , Bo-Yin Yang‡ , of Electrical Engineering, National Taiwan University, Taiwan ‡ Institute of Information Science

      1 Postquantum SSL/TLS for embedded systems Yun-An Chang† , Ming-Shing Chen†‡ , Jong-shian Wu† , Bo-Yin Yang‡ , of Electrical Engineering, National Taiwan University, Taiwan ‡ Institute of Information Science

      Add to Reading List

      Source URL: precision.moscito.org

      Language: English - Date: 2014-12-08 15:44:41