Hide

Results: 859



#Item
61

This report was compiled from May 2014 malware statistics as detected on scanned websites. Obfuscated Suspicious JavaScript Encoded JavaScript code commonly used to hide suspicious behavior was detected inweb pag

Add to Reading List

Source URL: www.quttera.com

Language: English - Date: 2014-09-26 21:19:17
    62World Wide Web / Software / Computing / Facebook / Social networking services / Virtual communities / Social networks / Social information processing / Social media / Web feed / Reddit / Internet troll

    First I “like” it, then I hide it: Folk Theories of Social Feeds Motahhare Eslami, Karrie Karahalios, Christian Sandvig† , Kristen Vaccaro Aimee Rickman‡ , Kevin Hamilton, Alex Kirlik University of Illinois at Ur

    Add to Reading List

    Source URL: social.cs.uiuc.edu

    Language: English - Date: 2016-01-18 04:45:57
    63

    There’s nowhere to run, nowhere to hide: isolating microJy AGN in the HDF-N Jack Radcliffe1,2,3, Thomas Muxlow1, Rob Beswick1, Mike Garrett2,4, Peter Barthel3 1 Jodrell Bank Centre for Astrophysics/e-MERLIN, The Univer

    Add to Reading List

    Source URL: events.kuoni-dmc.com

    Language: English - Date: 2016-04-12 08:28:31
      64Analysis of algorithms / Cache / Oblivious ram / Search engine indexing / Oblivious data structure / Keyword / Computer science / Computing

      The Fallacy of Composition of Oblivious RAM and Searchable Encryption Muhammad Naveed University of Illinois at Urbana-Champaign ABSTRACT Oblivious RAM (ORAM) is a tool proposed to hide access pattern leakage, and there

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-07-05 14:57:39
      65

      How to Hide a Planet For over 100 years, we’ve been searching the skies for signs of life beyond our little planet. Although we haven’t found any aliens yet, space is an enormous place and there are still an endless

      Add to Reading List

      Source URL: uk.unawe.org

      Language: English - Date: 2016-05-14 13:27:07
        66

        Hide and sneak Perceptions in the virtual storyteller Hans ten Brinke April 16, 2014

        Add to Reading List

        Source URL: essay.utwente.nl

        Language: English - Date: 2014-04-16 13:03:13
          67

          Unmanned Vehicle Robotic Warfare "Hide and Seek Strategies" by

          Add to Reading List

          Source URL: www.worldthinktank.net

          Language: English - Date: 2009-09-04 17:29:47
            68

            Hide and Sneak: Story Generation with Characters that Perceive and Assume Hans ten Brinke, Jeroen Linssen and Mari¨et Theune Human Media Interaction, University of Twente P.O. Box 217, 7500 AE Enschede, the Netherlands

            Add to Reading List

            Source URL: wwwhome.cs.utwente.nl

            Language: English - Date: 2014-08-11 17:11:53
              69Arizona / United States

              Internet Research 16 Digital Imaginaries Phoenix, Arizona, USAOctober 2015 Hide Presentations

              Add to Reading List

              Source URL: aoir.org

              Language: English - Date: 2015-11-02 23:19:54
              70Internet advertising / Advertising-free media / Anti-spam / Google Chrome extensions / Freeware / Adblock Plus / AdBlock / Ad blocking / AD Block / Opera / Firefox / Browser extension

              Adblock Plus Builds First Mobile Browser From the Ground Up; Leaves Ad Industry With Nowhere to Hide Popular ad blocker for desktops now available as full browser app for Android; blocks adware, speeds mobile browsing, s

              Add to Reading List

              Source URL: eyeo.com

              Language: English - Date: 2015-12-15 10:50:06
              UPDATE