Hidden

Results: 5368



#Item
151Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services Albert Kwon, Massachusetts Institute of Technology; Mashael AlSabah, Qatar Computing Research Institute, Qatar University, and Massachusetts

Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services Albert Kwon, Massachusetts Institute of Technology; Mashael AlSabah, Qatar Computing Research Institute, Qatar University, and Massachusetts

Add to Reading List

Source URL: www.usenix.org

- Date: 2016-02-22 01:46:44
    152Sand Wars Beijing’s Hidden Ambition in the South China Sea Amanda C.  Blair

    Sand Wars Beijing’s Hidden Ambition in the South China Sea Amanda C. Blair

    Add to Reading List

    Source URL: www.wm.edu

    - Date: 2016-12-28 21:09:19
      153Dependency Tree-based Sentiment Classification using CRFs with Hidden Variables ∗ Tetsuji Nakagawa∗ , Kentaro Inui∗† and Sadao Kurohashi∗‡ National Institute of Information and Communications Technology

      Dependency Tree-based Sentiment Classification using CRFs with Hidden Variables ∗ Tetsuji Nakagawa∗ , Kentaro Inui∗† and Sadao Kurohashi∗‡ National Institute of Information and Communications Technology

      Add to Reading List

      Source URL: aclweb.org

      - Date: 2010-06-14 21:31:18
        154Importing Ontologies with Hidden Content Bernardo Cuenca Grau and Boris Motik Computing Laboratory University of Oxford, UK  1

        Importing Ontologies with Hidden Content Bernardo Cuenca Grau and Boris Motik Computing Laboratory University of Oxford, UK 1

        Add to Reading List

        Source URL: ceur-ws.org

        - Date: 2009-07-07 04:46:34
          155The Hidden Power of Abstract Argumentation Semantics Thomas Linsbichler1 , Christof Spanring1,2 , and Stefan Woltran1 1  2

          The Hidden Power of Abstract Argumentation Semantics Thomas Linsbichler1 , Christof Spanring1,2 , and Stefan Woltran1 1 2

          Add to Reading List

          Source URL: homepages.abdn.ac.uk

          - Date: 2015-06-18 05:47:28
            156Hidden Profiles and Persuasion Cascades in Group Decision-Making Saori Chiba†and Marco LiCalzi‡ Current draft: May 5, 2016  Abstract

            Hidden Profiles and Persuasion Cascades in Group Decision-Making Saori Chiba†and Marco LiCalzi‡ Current draft: May 5, 2016 Abstract

            Add to Reading List

            Source URL: www.econ.kyoto-u.ac.jp

            - Date: 2016-05-05 08:43:57
              157Designing and implementing malicious hardware Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou University of Illinois at Urbana Champaign, Urbana, ILAbstract Hidden malic

              Designing and implementing malicious hardware Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, and Yuanyuan Zhou University of Illinois at Urbana Champaign, Urbana, ILAbstract Hidden malic

              Add to Reading List

              Source URL: www.usenix.org

              - Date: 2008-03-26 10:36:20
                158Appears in Proceedings of the Annual Meeting of the Cognitive Science Society, 2016 (CogSciMind reading: Discovering individual preferences from eye movements using switching hidden Markov models Tim Chuk (u30025

                Appears in Proceedings of the Annual Meeting of the Cognitive Science Society, 2016 (CogSciMind reading: Discovering individual preferences from eye movements using switching hidden Markov models Tim Chuk (u30025

                Add to Reading List

                Source URL: visal.cs.cityu.edu.hk

                - Date: 2016-11-28 01:40:00
                  159Tagging with Hidden Markov Models Michael Collins 1  Tagging Problems

                  Tagging with Hidden Markov Models Michael Collins 1 Tagging Problems

                  Add to Reading List

                  Source URL: www.cs.columbia.edu

                  - Date: 2011-09-15 10:36:58
                    160Thomas Lidbetter  A caching game with infinitely divisible hidden material Article (Accepted version) (Refereed)

                    Thomas Lidbetter A caching game with infinitely divisible hidden material Article (Accepted version) (Refereed)

                    Add to Reading List

                    Source URL: eprints.lse.ac.uk

                    - Date: 2015-11-23 10:50:15