Information and Computer Science

Results: 6880



#Item
1HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 23:38:22
2Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

Add to Reading List

Source URL: cohney.info

Language: English - Date: 2018-09-29 19:30:48
3Matjaz B. Juric Matjaz B. Juric holds a Ph.D. in computer and information science. He is Full Professor at the University of Ljubljana, Faculty of Computer and Information Science. He is the head of Laboratory for Integr

Matjaz B. Juric Matjaz B. Juric holds a Ph.D. in computer and information science. He is Full Professor at the University of Ljubljana, Faculty of Computer and Information Science. He is the head of Laboratory for Integr

Add to Reading List

Source URL: suncontract.org

Language: English - Date: 2018-10-19 08:31:23
4Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK  Abstract—The output

Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
5A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
6LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1  School of Computer Science, University of Birmingham, UK

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
7TRecSo: Enhancing Top-k Recommendation With Social Information ∗ Chanyoung Park, Donghyun Kim, Jinoh Oh, Hwanjo Yu† Dept. of Computer Science and Engineering

TRecSo: Enhancing Top-k Recommendation With Social Information ∗ Chanyoung Park, Donghyun Kim, Jinoh Oh, Hwanjo Yu† Dept. of Computer Science and Engineering

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:59:03
8Stabilizing Floating-Point Programs Using Provenance Analysis Yijia Gu(B) and Thomas Wahl College of Computer and Information Science, Boston, USA {guyijia,wahl}@ccs.neu.edu

Stabilizing Floating-Point Programs Using Provenance Analysis Yijia Gu(B) and Thomas Wahl College of Computer and Information Science, Boston, USA {guyijia,wahl}@ccs.neu.edu

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2017-02-09 10:23:03
9Personal Study Plan in the Master Study Program Applied Computer Science at Georg-August-University Goettingen Field of Specialization: Medical Informatics Information: Following § 4 of the examination and study regulat

Personal Study Plan in the Master Study Program Applied Computer Science at Georg-August-University Goettingen Field of Specialization: Medical Informatics Information: Following § 4 of the examination and study regulat

Add to Reading List

Source URL: www.mi.med.uni-goettingen.de

Language: English - Date: 2018-03-12 10:13:18
    10FRACTALS FOR ELECTRONIC APPLICATIONS Maciej J. Ogorzałek Department of Information Technologies Faculty of Physics, Astronomy and Applied Computer Science Jagiellonian University,

    FRACTALS FOR ELECTRONIC APPLICATIONS Maciej J. Ogorzałek Department of Information Technologies Faculty of Physics, Astronomy and Applied Computer Science Jagiellonian University,

    Add to Reading List

    Source URL: iwcsn2006.irmacs.sfu.ca

    Language: English - Date: 2006-08-18 03:39:42