MICHAEL

Results: 62683



#Item
31Design of experiments / Psychometrics / Statistical hypothesis testing / Software testing / Measurement

Empirically Revisiting the Test Independence Assumption Sai Zhang, Darioush Jalali, Jochen Wuttke, Kıvanç Muşlu, Wing Lam, Michael D. Ernst, David Notkin University of Washington

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:35
32Cryptography / Public-key cryptography / Key management / Public key infrastructure / Proxy re-encryption / Identity-based cryptography / Encryption / Symmetric-key algorithm / Key generation / Integrated Encryption Scheme / Hybrid cryptosystem / Cipher

NuCypher: A proxy re-encryption network to empower privacy in decentralized systems Michael Egorov,∗ David Nuñez,† and MacLane Wilkison‡ NuCypher (Dated: June 19, 2018) NuCypher is a decentralized Key Management S

Add to Reading List

Source URL: www.nucypher.com

Language: English
33Botnets / Cybercrime / Computing / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis⇧ Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi Michalis Kallitsis§ Deepak Kumar†

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2018-01-19 09:59:23
34Cryptography / Computational complexity theory / Complexity classes / Public-key cryptography / Interactive proof system / NP / NEXPTIME / IP / Probabilistically checkable proof / Commitment scheme / Proof of secure erasure / Randomized algorithm

Toward practical and unconditional verification of remote computations Srinath Setty∗, Andrew J. Blumberg∗, and Michael Walfish∗ 1 Introduction

Add to Reading List

Source URL: www.pepper-project.org

Language: English - Date: 2017-11-11 14:59:54
35Computing / Software engineering / Computer programming / Debugging / Cross-platform software / Object-oriented programming languages / Procedural programming languages / Assertion / Logic in computer science / Configuration management / PHP / Program slicing

Which Configuration Option Should I Change? Sai Zhang Michael D. Ernst Department of Computer Science & Engineering

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
36Geometry / Algebra / Mathematics / Lie groups / Affine geometry / Differential geometry / Projective geometry / Reductive group / Representation theory / Affine space / Grassmannian / Affine group

Proc. Int. Cong. of Math. – 2018 Rio de Janeiro, Vol–1298) DOUBLE AFFINE GRASSMANNIANS AND COULOMB BRANCHES OF 3dN = 4 QUIVER GAUGE THEORIES Michael Finkelberg

Add to Reading List

Source URL: eta.impa.br

Language: English - Date: 2018-07-25 13:17:42
37Computational complexity theory / Theory of computation / IP / Proof of knowledge / NP / Zero-knowledge proof / Certificate / Theoretical computer science / Applied mathematics

Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby⋆ , Srinath Setty† , Zuocheng Ren† , Andrew J. Blumberg† , and Michael Walfish⋆ ⋆ †

Add to Reading List

Source URL: cs.nyu.edu

Language: English - Date: 2014-12-14 14:47:16
38Mathematics / Measure theory / Boolean algebra / Experiment / Sigma-algebra / Determinacy / Abstract algebra / Stochastic game / -automaton / Lie algebras / Lifting theory / Littelmann path model

Playing Stochastic Games Precisely Taolue Chen1 , Vojtˇech Forejt1 , Marta Kwiatkowska1 , Aistis Simaitis1 , Ashutosh Trivedi2 , and Michael Ummels3 1 Department of Computer Science, University of Oxford, Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2012-07-04 05:45:30
39Computational complexity theory / Logic / Mathematics / Randomized algorithms / Automated theorem proving / Logic programming / Probabilistically checkable proof / IP / NP / Substitution / MAX-3SAT / operator

Resolving the conflict between generality and plausibility in verified computation Srinath Setty? , Benjamin Braun? , Victor Vu? , Andrew J. Blumberg? , Bryan Parno† , and Michael Walfish? ? The University of Texas at

Add to Reading List

Source URL: www.pepper-project.org

Language: English - Date: 2017-11-11 14:59:54
40Cryptocurrencies / Blockchains / Ethereum / Alternative currencies / Concurrent computing / Computing / Distributed computing / Cross-platform software / Smart contract / Solidity / ERC-20 / CryptoKitties

Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts Yi Zhou Deepak Kumar Surya Bakshi Joshua Mason Andrew Miller Michael Bailey University of Illinois, Urbana-Champaign Abstract Interacting with Ethereum smart

Add to Reading List

Source URL: kumarde.com

Language: English - Date: 2018-08-16 10:08:06
UPDATE