MICHAEL

Results: 62683



#Item
61Genetics / Biology / Epigenetics / DNA / Genomics / Molecular biology / Genetic mapping / DNA methylation / Bisulfite sequencing / Methylation / CpG site / Bayesian tool for methylation analysis

Identifying Personal DNA Methylation Profiles by Genotype Inference Michael Backes∗ , Pascal Berrang∗ , Matthias Bieg† , Roland Eils†‡ , Carl Herrmann†‡ , Mathias Humbert∗ , Irina Lehmann§ ∗ CISPA,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:30
62Software / Computing / System software / Text editors / Sphinx / Git / Emacs / IPython / Look and feel / Cd / Iproute2

sampledoc Documentation Release 1.0 John Hunter, Fernando Perez, Michael Droettboom Apr 06, 2017

Add to Reading List

Source URL: matplotlib.org

Language: English - Date: 2018-09-21 16:35:12
63DBLP / University of Trier / Computer science / VLDB / BibTeX / Michael Ley / Information science / Computing

DBLP — Some Lessons Learned ∗ Michael Ley Universitat ¨ Trier, Informatik D–54286 Trier Germany

Add to Reading List

Source URL: dblp.org

Language: English - Date: 2009-06-18 07:10:45
64United States trademark law / Intellectual property law / Trademark law / Law / Brand management / Brands / Trademark / Allegation of use / Amendment to allege use / Lanham Act / Patent application

What Can Harm the Reputation of a Trademark? A Critical Re-Evaluation of Dilution by Tarnishment Michael Handler Commentary: The Switch Thrown Wrong—How Railrunner Sent Intent-to-Use Down the Wrong Tracks Pamela S. Che

Add to Reading List

Source URL: chesteklegal.com

Language: English - Date: 2016-06-28 15:16:18
65Computing / Cryptography / Cryptographic software / E-commerce / Internet Standards / Internet protocols / Secure communication / Transport Layer Security / Snippet / Microsoft CryptoAPI / Public-key cryptography / Application programming interface

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security Felix Fischer, Konstantin B¨ottinger, Huang Xiao, Christian Stransky∗ , Yasemin Acar∗ , Michael Backes∗ , Sascha Fahl∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:12
66Mathematical analysis / Special functions / Mathematics / Trigonometry / Angle / Dimensionless numbers / Ratios / Analytic functions / Trigonometric functions / Sine / Taylor series / Polynomial

Poster: Secure Computations of Trigonometric and Inverse Trigonometric Functions Fattaneh Bayatbabolghani∗ , Marina Blanton† , Mehrdad Aliasgari‡ and Michael Goodrich§ ∗ Computer Science and Engineering, Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-25 08:06:46
67Computing / Computer architecture / Computer memory / Transaction processing / Theoretical computer science / Memory barrier / Consistency model / Memory ordering / Model theory / Algorithm / Formal language / Constraint

Automatic Inference of Memory Fences Michael Kuperstein Martin Vechev Eran Yahav

Add to Reading List

Source URL: practicalsynthesis.github.io

Language: English - Date: 2018-01-15 09:26:26
68Botnets / Computing / Cybercrime / Cyberwarfare / Denial-of-service attacks / Linux malware / Computer network security / Mirai / BASHLITE / Internet of things / TR-069 / Denial-of-service attack

Understanding the Mirai Botnet Manos Antonakakis Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein◦ Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi◦ Michalis Kallitsis§ Deepak Kumar

Add to Reading List

Source URL: mbernhard.com

Language: English - Date: 2017-08-15 20:35:58
69Formal methods / Theoretical computer science / Cognitive science / Logic in computer science / Cybernetics / Logic / Artificial intelligence / Runtime verification / Intelligent agent / Model checking / Motivation / Autonomy

Verifiable Autonomy Michael Fisher University of Liverpool, 11th September 2015 Formal Verification

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2015-11-05 09:32:14
70

NuCypher KMS: 分布式密钥管理系统 Michael Egorov∗ 和 MacLane Wilkison† NuCypher David Nuñez‡ NICS 实 验 室, 马 拉 加 大 学, 西 班 牙

Add to Reading List

Source URL: www.nucypher.com

Language: Chinese
    UPDATE