Key

Results: 94449



#Item
51Digital media / Social networking services / World Wide Web / Software / Microblogging / Real-time web / Blogging / Facebook / Reblogging / Social media / Twitter / Economic model

Modeling and predicting retweeting dynamics via a mixture process Jinhua Gao, Huawei Shen, Shenghua Liu and Xueqi Cheng , {shenhuawei, liushenghua, cxq}@ict.ac.cn CAS Key Laboratory of Network

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:35:48
52Cryptography / Computing / Transport Layer Security / Internet protocols / Cryptographic protocols / Internet Standards / Public-key cryptography / OCSP stapling / Public key certificate / Public key infrastructure / Online Certificate Status Protocol / Hypertext Transfer Protocol

Towards Sustainable Evolution for the TLS Public-Key Infrastructure Taeho Lee Christos Pappas

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
53Legal history / Direct democracy / Initiative / Right to petition / Politics of California / Political philosophy / Law / Buckley v. American Constitutional Law Foundation /  Inc.

INITIATIVE PROCESS INFORMATION Wyoming Secretary of State’s Office Election Division This document summarizes key provisions of the initiative process in Wyoming. Refer to the Wyoming Constitution and statutes for appl

Add to Reading List

Source URL: soswy.state.wy.us

Language: English - Date: 2015-07-23 10:22:17
54Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Error detection and correction / Hash function / Digital signature / Collision resistance / Hash / Trapdoor function / Security of cryptographic hash functions

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-12-13 06:49:27
55Computing / Information / Data management / Data management plan / Open data / Big data / Data sharing / Open by default / Data mining / Data center / Data curation / Open science

REPORT OF THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON OPEN RESEARCH DATA Executive summary and key outcomes The European Commission held a public consultation on open research data on 2 July 2013 in Brussels, which wa

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2017-11-21 05:46:41
56Cryptocurrencies / Exonumia / Numismatics / Economy / Zcash / Bitcoin / Blockchain / Ethereum / Non-interactive zero-knowledge proof / Bitcoin Private

Zcash & Zerocash: Data mining, cryptanalysis and key reuse Killian Davitt, Lena Petersen March 25, 2018 Intro This document was written as part of the GA18 Cryptanalysis course to explain my work as part of Project PK.

Add to Reading List

Source URL: killiandavitt.me

Language: English - Date: 2018-10-05 08:41:07
57Information technology management / Management / Economy / Information technology / ITIL / Project management / Project portfolio management / TeamDynamix / IT service management / Configuration Management / Change management / Release management

SOLUTIONS FOR THE PUBLIC SECTOR KEY BUILDING BLOCKS FOR BUILDING A DIGITAL GOVERNMENT SERVICE & PROJECT MANAGEMENT Together on one platform.

Add to Reading List

Source URL: www.teamdynamix.com

Language: English
58Social enterprise / Sustainable Development Goals / Master of Enterprise / Global politics / World / Economy / UNESCO / Social Enterprise Academy-Nigeria / Center for Sustainable Global Enterprise

Understanding Social Enterprise & the Sustainable Development Goals • Understand key concepts and values of social enterprise • Gain vital skills and knowledge to set up a social enterprise in your school • S

Add to Reading List

Source URL: www.scotdec.org.uk

Language: English - Date: 2018-10-04 05:58:54
59Computer security / Antivirus software / Computing / Technology / Computer network security / Mobile device management / Bring your own device / Comodo Group / Mobile security / Endpoint security / Microsoft Intune / Comodo Mobile Security

Data Sheet Comodo Mobile Device Management Secure and centrally manage large-scale deployments of corporate and personal mobile devices Key Benefits

Add to Reading List

Source URL: www.comodo.com

Language: English - Date: 2018-09-21 10:15:41
60Cryptocurrencies / Blockchains / Concurrent computing / Numismatics / Distributed computing / Kin / Decentralized application / Token coin / Token

ESS Token Utility and Functions There are a number of key functions that ESS will enable, with additional functionality added in as the Essentia project is developed further. This will occur on an incremental basis, with

Add to Reading List

Source URL: wiki.essentia.one

Language: English - Date: 2018-07-23 04:17:20
UPDATE