Kohno

Results: 77



#Item
31

PDF Document

Add to Reading List

Source URL: www.kohno.ed.jp

Language: Korean - Date: 2016-02-21 23:15:56
    32

    PDF Document

    Add to Reading List

    Source URL: www.kohno.ed.jp

    Language: Japanese - Date: 2016-02-21 23:15:54
      33加盟団体各位  2013年1月21日 公益財団法人 日本バレーボール協会 会長 中 野

      加盟団体各位 2013年1月21日 公益財団法人 日本バレーボール協会 会長 中 野

      Add to Reading List

      Source URL: www.kohno.ed.jp

      Language: Japanese - Date: 2016-02-21 23:15:57
        347	
  Dec.	
  2012	
 Miya	
  Kohno,	
  	
   © 2010 Cisco and/or its affiliates. All rights reserved. 1

        7  Dec.  2012 Miya  Kohno,     © 2010 Cisco and/or its affiliates. All rights reserved. 1

        Add to Reading List

        Source URL: www.sdnjapan.org

        Language: English - Date: 2015-10-01 10:32:25
          35Comet: An active distributed key-value store Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy University of Washington Abstract Distributed key-value storage systems are widely used in

          Comet: An active distributed key-value store Roxana Geambasu, Amit A. Levy, Tadayoshi Kohno, Arvind Krishnamurthy, Henry M. Levy University of Washington Abstract Distributed key-value storage systems are widely used in

          Add to Reading List

          Source URL: vanish.cs.washington.edu

          Language: English - Date: 2010-09-23 18:52:08
            36To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ Tamara Bonaci† , Jeffrey Herron † , Tariq Yusuf‡ , Junjie Yan† , Tadayoshi Kohno‡ , Howard Ja

            To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ Tamara Bonaci† , Jeffrey Herron † , Tariq Yusuf‡ , Junjie Yan† , Tadayoshi Kohno‡ , Howard Ja

            Add to Reading List

            Source URL: 45.33.36.144

            Language: English - Date: 2015-05-14 18:28:36
              37Analysis of the WinZip Encryption Method  Tadayoshi Kohno

              Analysis of the WinZip Encryption Method Tadayoshi Kohno

              Add to Reading List

              Source URL: www.cs.jhu.edu

                38Poster—The Security Cards: A Security Threat Brainstorming Toolkit Tamara Denning†, Batya Friedman‡, Tadayoshi Kohno† †  Computer Science & Engineering

                Poster—The Security Cards: A Security Threat Brainstorming Toolkit Tamara Denning†, Batya Friedman‡, Tadayoshi Kohno† † Computer Science & Engineering

                Add to Reading List

                Source URL: www.ieee-security.org

                - Date: 2014-05-19 18:56:28
                  39<4D6963726F736F667420576F7264202D2082B182A482CC8EA8954088F48D4189C8814096E29066955B816989708CEA94C5816A2E646F63>

                  <4D6963726F736F667420576F7264202D2082B182A482CC8EA8954088F48D4189C8814096E29066955B816989708CEA94C5816A2E646F63>

                  Add to Reading List

                  Source URL: www.kohno-ent.com

                  - Date: 2013-07-16 03:50:10