It

Results: 512079



#Item
311Economy / Cryptocurrencies / Money / Finance / Blockchains / Financial technology / Decentralization / Ethereum / Counterparty / Futures contract / Smart contract / Oracle Corporation

Whitepaper © 2018 bZeroX, LLC Abstract bZx is built on Ethereum and integrated with the 0x protocol. It is the first

Add to Reading List

Source URL: b0x.network

Language: English - Date: 2018-10-25 11:26:51
312Theoretical computer science / Logic in computer science / Computational complexity theory / Mathematics / Electronic design automation / Formal methods / NP-complete problems / Combinatorial optimization / Satisfiability modulo theories / Boolean satisfiability problem / Job shop scheduling / SMT

Satisfiability Modulo Theories and the SMT Competition Tjark Weber March 29, 2017

Add to Reading List

Source URL: user.it.uu.se

Language: English - Date: 2017-04-04 10:36:24
313Educational technology / Online education / Open educational resources / Education / Human behavior / Learning / Reference / Coursera / Deep learning / Karaoke / Andrew Ng / Udacity

Distributed Computing Prof. R. Wattenhofer Automatic Karaoke Song Annotation with Deep Learning Be it KTV or Singstar; karaoke is a pastime loved by many. However, creating new karaoke

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2018-10-11 05:15:40
314Economy / Finance / Money / E-commerce / Financial technology / Cashless society / International finance / Mobile payment / Hong Leong Bank / HSBC / Wirecard / CurrencyFair

2018 PROGRAM Payments as a Global Village – Fostering Regional Solutions It is a small world we are living in and globalization has made it even smaller! Global Payment Summit-Asia 2018 takes a new direction on-board

Add to Reading List

Source URL: globalpaymentsummit.com

Language: English - Date: 2018-09-13 20:29:52
315Mathematical analysis / Mathematics / Functional analysis / Operator theory / Algebra / Mathematical notation / Operator / Matrix / Pseudo-differential operator / Bounded operator / Banach algebra / Mutation

Left inverses of matrices with polynomial decay. Romain Tessera∗ July 21, 2010 Abstract It is known that the algebra of Schur operators on `2 (namely operators

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2010-07-21 23:28:46
316Cryptography / Computing / Information and communications technology / Security engineering / Cloud applications / Cloud infrastructure / Data security / AXA / CAC 40 / Software as a service / Vera Security / End-to-end encryption

PRESS RELEASE PARIS, September 14th 2017 AXA Strategic Ventures invests in an end-to-end encryption solution for securing cloud-hosted data. AXA Strategic Ventures (ASV) announces today it has participated with Idinvest,

Add to Reading List

Source URL: www.axavp.com

Language: English - Date: 2018-04-06 05:43:52
317Marketing / Education / Cognition / Human behavior / Academic degree / Master's degree / Research / Bachelor's degree / Critical thinking / Outline of marketing

Learning Outcomes for Master of Marketing (MM) National Qualification Framework for Iceland Master of Marketing at Reykjavik University Master of Marketing (MM) is a 90 ECTS-credit qualification at master level. It focus

Add to Reading List

Source URL: en.ru.is

Language: English - Date: 2018-06-27 06:38:03
318Cybercrime / Computer security / Cyberwarfare / Security engineering / Crime / Computer network security / National security / Cyberattack / Phishing / Threat / Cyber insurance

1 Contents Introduction ............................................................................................................................................ 3 IT Support ........................................

Add to Reading List

Source URL: superfast-it.com

Language: English - Date: 2018-10-02 22:01:31
319Cryptography / Post-quantum cryptography / Lattice-based cryptography / Models of computation / Homeomorphisms / Homomorphic encryption / Quantum computing / Lattice / Learning with errors / RSA / One-time pad / Quantum circuit

Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-04-10 03:50:18
320Homelessness in the United States / Housing / Homelessness / Distribution of wealth / Humanitarian aid / Socioeconomics / Coalition on Homelessness /  San Francisco / Youth homelessness / Street children / Homelessness in the San Francisco Bay Area

:00 PM Coalition on Homelessness, San Francisco Fact Sheet on Homelessness Homelessness is not a lifestyle choice—it is the result of extreme poverty. •

Add to Reading List

Source URL: www.cohsf.org

Language: English - Date: 2018-05-22 12:50:39
UPDATE