Information and Computer Science

Results: 6880



#Item
1Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 23:38:22
2Security engineering / Cyberwarfare / Computing / Nadia Heninger / Transport Layer Security / Cryptography / E-commerce / Secure communication / Heninger / Alex Halderman / Association for Computing Machinery / DROWN attack

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

Add to Reading List

Source URL: cohney.info

Language: English - Date: 2018-09-29 19:30:48
3Enterprise application integration / Computing / Oracle SOA Suite / Matja / Business Process Execution Language / Oracle Fusion Middleware / Rozman / Economy / Software architecture

Matjaz B. Juric Matjaz B. Juric holds a Ph.D. in computer and information science. He is Full Professor at the University of Ljubljana, Faculty of Computer and Information Science. He is the head of Laboratory for Integr

Add to Reading List

Source URL: suncontract.org

Language: English - Date: 2018-10-19 08:31:23
4Mathematical analysis / Mathematics / Experiment / Information theory / Statistical theory / Measure theory / Random variable / Statistical randomness / Sigma-algebra / Probability distribution / Joint probability distribution / Probability space

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
5Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
6Information theory / Statistical theory / Mathematics / Mathematical analysis / Entropy / Mutual information / Expected value / Confidence interval / Information flow / Binomial distribution / Conditional entropy / Quantities of information

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
7Information science / Collective intelligence / Recommender systems / Information retrieval / Collaboration / Social information processing / Information systems / Collaborative filtering / Matrix factorization / Machine learning / Personalization

TRecSo: Enhancing Top-k Recommendation With Social Information ∗ Chanyoung Park, Donghyun Kim, Jinoh Oh, Hwanjo Yu† Dept. of Computer Science and Engineering

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:59:03
8Operator theory / Symbol / Operator / Computability theory

Stabilizing Floating-Point Programs Using Provenance Analysis Yijia Gu(B) and Thomas Wahl College of Computer and Information Science, Boston, USA {guyijia,wahl}@ccs.neu.edu

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2017-02-09 10:23:03
9

Personal Study Plan in the Master Study Program Applied Computer Science at Georg-August-University Goettingen Field of Specialization: Medical Informatics Information: Following § 4 of the examination and study regulat

Add to Reading List

Source URL: www.mi.med.uni-goettingen.de

Language: English - Date: 2018-03-12 10:13:18
    10

    FRACTALS FOR ELECTRONIC APPLICATIONS Maciej J. Ogorzałek Department of Information Technologies Faculty of Physics, Astronomy and Applied Computer Science Jagiellonian University,

    Add to Reading List

    Source URL: iwcsn2006.irmacs.sfu.ca

    Language: English - Date: 2006-08-18 03:39:42
      UPDATE