J.

Results: 175847



#Item
11Algebra / Abstract algebra / Mathematics / Algebraic geometry / Sheaf theory / Characteristic classes / Complex manifolds / Vector bundles / Coherent sheaf / Cohomology / Todd class / Sheaf

Grivaux, Julien On a conjucture of Kashiwara relating Chern and Euler classes of O-modules. (English) Zbl  J. Differ. Geom. 90, No. 2, Characteristic classes in Hochschild homology are well

Add to Reading List

Source URL: jgrivaux.perso.math.cnrs.fr

Language: English - Date: 2018-03-18 08:56:03
12Software / Advertising / Marketing / Online advertising / Firefox add-ons / Google Chrome extensions / Advertising-free media / Microsoft Edge extensions / Ad blocking / GNOME Web / Adblock Plus / Targeted advertising

SECURITY The Adblocking Tug-of-War The Adblocking Tug-of-War H A M E D H A D D A D I , R I S H A B N I T H YA N A N D , S H E H A R B A N O K H AT TA K , M O B I N J AV E D, N A R S EO VA L L I N A - R O D R I G U E Z ,

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:26
13Algebra / Abstract algebra / Mathematics / Finite fields / Group theory / Logarithms / Algebraic number theory / Numerical linear algebra / XTR / Discrete logarithm / Gaussian elimination / Quadratic field

Algebraic techniques for number field computations (extended abstract) Jean-Fran¸cois Biasse1 , Michael J. Jacobson, Jr.2? , and Alan K. Silvester3 ´ Ecole Polytechnique, 91128 Palaiseau, France

Add to Reading List

Source URL: www.lix.polytechnique.fr

Language: English - Date: 2014-09-02 14:57:05
14Finite automata / DFA minimization / Deterministic automaton / Finite-state machine / Theoretical computer science / Muller automaton / Bchi automaton

Unbounded Model-Checking with Interpolation for Regular Language Constraints Graeme Gange, Jorge A. Navas, Peter J. Stuckey, Harald Søndergaard, and Peter Schachte The University of Melbourne {ggange,jnavas,pjs,harald,s

Add to Reading List

Source URL: jorgenavas.github.io

Language: English - Date: 2018-10-25 12:43:22
15Theoretical computer science / Information retrieval / Information science / Model checkers / Hashing / Model checking / Ith / SPIN model checker / Bitstate hashing / Cryptographic hash function / Correctness / Applied mathematics

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, # 1 Swarm Verification Techniques Gerard J. Holzmann, Rajeev Joshi, and Alex Groce

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:27:55
16Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
17Financial markets / Finance / Economy / Money / Share trading / Electronic communication network / High-frequency trading / Algorithmic trading / Market liquidity / Market microstructure / Day trading / Bidask spread

HONG KONG INSTITUTE FOR MONETARY RESEARCH HIGH-FREQUENCY TRADING IN THE U.S. TREASURY MARKET AROUND MACROECONOMIC NEWS ANNOUNCEMENTS George J. Jiang, Ingrid Lo and Giorgio Valente

Add to Reading List

Source URL: www.hkimr.org

Language: English - Date: 2018-08-16 22:14:26
18

«PARTY»-«PRECINCT» «FIRSTNAME»J<> "" " " "" J «MIDDLE» «LASTNAME»<> "" ", " "" «SUFFIX» «RES_HOUSE»<> "" " " "" «RES_FRAC» «RES_STREET» «RES_APT» «RES_CITY», «RES_STATE» «RES_ZIP» «Next Record

Add to Reading List

Source URL: vote.franklincountyohio.gov

Language: English - Date: 2018-07-16 14:21:36
    19Model checkers / Software engineering / Theoretical computer science / Formal methods / C / C++ / Sizeof / Model checking / Promela / Abstraction / Computing / Abstract interpretation

    Model-Driven Software Verification Gerard J. Holzmann Rajeev Joshi JPL Laboratory for Reliable Software California Institute of Technology 4800 Oak Grove Drive

    Add to Reading List

    Source URL: rjoshi.org

    Language: English - Date: 2010-09-11 18:26:03
    20Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

    Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

    Add to Reading List

    Source URL: benjaminvandersloot.com

    Language: English - Date: 2018-09-18 11:06:16
    UPDATE