J

Results: 175847



#Item
81fåîÉåíçêó  ^ÅÅKVTNN táääá~ã=j~íÜÉëçå=m~éÉêë  k~íáçå~ä=iáÄê~êó=çÑ=pÅçíä~åÇ

fåîÉåíçêó ^ÅÅKVTNN táääá~ã=j~íÜÉëçå=m~éÉêë k~íáçå~ä=iáÄê~êó=çÑ=pÅçíä~åÇ

Add to Reading List

Source URL: www.nls.uk

Language: Portuguese - Date: 2002-05-16 10:12:36
    82Why Information can be Free ˇ ce?† Ivana Caˇ ?  Joanna J. Bryson†

    Why Information can be Free ˇ ce?† Ivana Caˇ ? Joanna J. Bryson†

    Add to Reading List

    Source URL: www.cs.bath.ac.uk

    Language: English - Date: 2005-01-16 17:42:03
    83Abstract Interpretation over Non-Lattice Abstract Domains Graeme Gange, Jorge A. Navas, Peter Schachte, Harald Søndergaard, and Peter J. Stuckey Department of Computing and Information Systems, The University of Melbour

    Abstract Interpretation over Non-Lattice Abstract Domains Graeme Gange, Jorge A. Navas, Peter Schachte, Harald Søndergaard, and Peter J. Stuckey Department of Computing and Information Systems, The University of Melbour

    Add to Reading List

    Source URL: jorgenavas.github.io

    Language: English - Date: 2018-10-25 12:43:22
    84Journal fu¨r die reine und angewandte Mathematik J. reine angew. Math), 1—35 DOICRELLE

    Journal fu¨r die reine und angewandte Mathematik J. reine angew. Math), 1—35 DOICRELLE

    Add to Reading List

    Source URL: math.univ-bpclermont.fr

    Language: English - Date: 2018-03-05 11:11:23
    85Toward the Synthesis of Constraint Solvers  Douglas R. Smith Stephen J. Westfold Kestrel Institute Palo Alto, CA 94304

    Toward the Synthesis of Constraint Solvers Douglas R. Smith Stephen J. Westfold Kestrel Institute Palo Alto, CA 94304

    Add to Reading List

    Source URL: www.kestrel.edu

    Language: English - Date: 2014-11-17 20:46:33
    86Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby⋆ , Srinath Setty† , Zuocheng Ren† , Andrew J. Blumberg† , and Michael Walfish⋆ ⋆ †

    Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby⋆ , Srinath Setty† , Zuocheng Ren† , Andrew J. Blumberg† , and Michael Walfish⋆ ⋆ †

    Add to Reading List

    Source URL: cs.nyu.edu

    Language: English - Date: 2014-12-14 14:47:16
    87Differential Power Analysis and Fault Attacks on Hash-Based Signature Schemes Matthias J. Kannwischer 27 March 2018 Radboud University, Nijmegen, The Netherlands

    Differential Power Analysis and Fault Attacks on Hash-Based Signature Schemes Matthias J. Kannwischer 27 March 2018 Radboud University, Nijmegen, The Netherlands

    Add to Reading List

    Source URL: kannwischer.eu

    Language: English - Date: 2018-03-26 10:26:09
    88Area 1 (Virtual Machines and Compilation) Danny Yoo () Abstract The ideas behind tracing JITs go back to the late 1970s, but have become especially popular lately. Explain the principles behind a tracing J

    Area 1 (Virtual Machines and Compilation) Danny Yoo () Abstract The ideas behind tracing JITs go back to the late 1970s, but have become especially popular lately. Explain the principles behind a tracing J

    Add to Reading List

    Source URL: www.hashcollision.org

    Language: English
    89Modular, Crash-Safe Refinement for ASMs with Submachines Gidon Ernsta , J¨ org Pf¨ahlera , Gerhard Schellhorna , Wolfgang Reifa a Institute

    Modular, Crash-Safe Refinement for ASMs with Submachines Gidon Ernsta , J¨ org Pf¨ahlera , Gerhard Schellhorna , Wolfgang Reifa a Institute

    Add to Reading List

    Source URL: www.isse.uni-augsburg.de

    Language: English - Date: 2017-01-11 10:52:45
    90Swarm Verification 1 Gerard J. Holzmann, Rajeev Joshi, Alex Groce Jet Propulsion Laboratory, California Institute of Technology   Abstract

    Swarm Verification 1 Gerard J. Holzmann, Rajeev Joshi, Alex Groce Jet Propulsion Laboratory, California Institute of Technology Abstract

    Add to Reading List

    Source URL: rjoshi.org

    Language: English - Date: 2010-09-11 18:29:11