Lee

Results: 18787



#Item
11Publicado en Septiembre deEste documento usa la versión 6.0 de NetLogo. Traducido al Castellano por Haroldo Miranda. Tutorial # 1. Modelos Si lee la sección Modelo de muestra: Party, tendrá una breve introducci

Publicado en Septiembre deEste documento usa la versión 6.0 de NetLogo. Traducido al Castellano por Haroldo Miranda. Tutorial # 1. Modelos Si lee la sección Modelo de muestra: Party, tendrá una breve introducci

Add to Reading List

Source URL: ccl.northwestern.edu

Language: Spanish - Date: 2018-09-19 16:41:35
    12Millisort: An Experiment in Granular Computing Seo Jin Park with Yilong Li, Collin Lee and John Ousterhout  Massively Parallel Granular Computing

    Millisort: An Experiment in Granular Computing Seo Jin Park with Yilong Li, Collin Lee and John Ousterhout Massively Parallel Granular Computing

    Add to Reading List

    Source URL: platformlab.stanford.edu

    Language: English - Date: 2018-06-18 15:29:53
    13FOR RELEASE APRIL 17, 2018  BY Janna Anderson and Lee Rainie FOR MEDIA OR OTHER INQUIRIES: Janna Anderson, Director, Imagining the Internet Center

    FOR RELEASE APRIL 17, 2018 BY Janna Anderson and Lee Rainie FOR MEDIA OR OTHER INQUIRIES: Janna Anderson, Director, Imagining the Internet Center

    Add to Reading List

    Source URL: assets.pewresearch.org

    Language: English - Date: 2018-06-14 15:45:53
    14Dtre|A Semi-Automatic Transformation System Lee Blaine and Allen Goldberg Kestrel Institute, 3260 Hillview Avenue, Palo Alto, California 94304, USA  Abstract

    Dtre|A Semi-Automatic Transformation System Lee Blaine and Allen Goldberg Kestrel Institute, 3260 Hillview Avenue, Palo Alto, California 94304, USA Abstract

    Add to Reading List

    Source URL: www.kestrel.edu

    Language: English - Date: 2012-08-08 19:03:01
    15Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Yanick Fratantonio Chenxiong Qian, Simon P. Chung, Wenke Lee

    Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop Yanick Fratantonio Chenxiong Qian, Simon P. Chung, Wenke Lee

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:33
    16Source Accountability with Domain-brokered Privacy Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig ETH Zürich {kthlee, pappasch, david.barrera, psz, adrian.perrig}@inf.ethz.ch  ABSTRACT

    Source Accountability with Domain-brokered Privacy Taeho Lee, Christos Pappas, David Barrera, Pawel Szalachowski, Adrian Perrig ETH Zürich {kthlee, pappasch, david.barrera, psz, adrian.perrig}@inf.ethz.ch ABSTRACT

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
      17Microsoft Word - pp1404-lee.docx

      Microsoft Word - pp1404-lee.docx

      Add to Reading List

      Source URL: gdac.uqam.ca

      Language: English - Date: 2017-10-04 00:51:42
      18Taming Undefined Behavior in LLVM Juneyoung Lee Yoonseung Kim Youngju Song Chung-Kil Hur Seoul National University, Korea

      Taming Undefined Behavior in LLVM Juneyoung Lee Yoonseung Kim Youngju Song Chung-Kil Hur Seoul National University, Korea

      Add to Reading List

      Source URL: www.cs.utah.edu

      Language: English - Date: 2017-04-14 11:35:39
      19Towards Sustainable Evolution for the TLS Public-Key Infrastructure Taeho Lee Christos Pappas

      Towards Sustainable Evolution for the TLS Public-Key Infrastructure Taeho Lee Christos Pappas

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English
      20The Case for In-Network Replay Suppression Taeho Lee∗ Christos Pappas∗  Adrian Perrig

      The Case for In-Network Replay Suppression Taeho Lee∗ Christos Pappas∗ Adrian Perrig

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English