Matteo

Results: 860



#Item
1Computer security / Security engineering / Prevention / Crime prevention / Cryptography / Information governance / National security / Data quality / Information science / Middleware / Mandatory access control / Database

SAFEWEB: A Middleware for Securing Ruby-based Web Applications Petr Hosek1 , Matteo Migliavacca1 , Ioannis Papagiannis1 , David M. Eyers2 , David Evans3 , Brian Shand4 , Jean Bacon3 , and Peter Pietzuch1 1

Add to Reading List

Source URL: srg.doc.ic.ac.uk

Language: English - Date: 2011-12-01 05:00:04
2Theoretical computer science / Constraint programming / Software engineering / Electronic design automation / Formal methods / Logic in computer science / NP-complete problems / Satisfiability modulo theories / Solver / Boolean satisfiability problem / DPLL algorithm / Constraint satisfaction problem

Visualizing SMT-Based Parallel Constraint Solving Jelena Budakovic, Matteo Marescotti, Antti E. J. Hyv¨arinen, and Natasha Sharygina Universit` a della Svizzera italiana, Switzerland Abstract

Add to Reading List

Source URL: smt-workshop.cs.uiowa.edu

Language: English - Date: 2017-09-02 14:08:49
3

PDF Document

Add to Reading List

Source URL: matteo.vaccari.name

- Date: 2010-11-11 17:45:23
    4

    PDF Document

    Add to Reading List

    Source URL: matteo.vaccari.name

    - Date: 2011-03-06 04:00:04
      5

      Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-calculus Michael Backes1,2 , C˘at˘alin Hri¸tcu1 , and Matteo Maffei1 1 Saarland University, Saarbrücken, Germany

      Add to Reading List

      Source URL: prosecco.gforge.inria.fr

      Language: English - Date: 2014-03-05 17:17:53
        6

        Systemic Risk, Contagion, and Financial Networks: a Survey Matteo Chinazzi∗ Giorgio Fagiolo†

        Add to Reading List

        Source URL: www.lem.sssup.it

        Language: English - Date: 2015-06-08 07:14:29
          7

          z-Tree Crash Course Matteo Ploner and

          Add to Reading List

          Source URL: exside-itn.eu

          Language: English - Date: 2017-11-10 06:38:33
            8

            Achieving Security Despite Compromise Using Zero-knowledge Michael Backes1,2 , Martin P. Grochulla1 , C˘at˘alin Hrit¸cu1 , and Matteo Maffei1 1 Saarland University, Saarbr¨ucken, Germany 2

            Add to Reading List

            Source URL: www.sps.cs.uni-saarland.de

            Language: English - Date: 2013-10-09 19:06:00
              9

              Robotics and new opportunities: applications, open access and technology transfer Matteo Bianchi1,2 1 Centro di Ricerca ‘’Enrico Piaggio’’, Università di Pisa (UNIPI)

              Add to Reading List

              Source URL: www.sidra2017.deib.polimi.it

              Language: English - Date: 2017-09-30 01:56:31
                10

                THE PHD PROGRAM IN COMPUTER AND CONTROL ENGINEERING MATTEO SONZA REORDA DEPT. OF CONTROL AND COMPUTER ENGINEERING (DAUIN)

                Add to Reading List

                Source URL: www.phd-dauin.polito.it

                Language: English - Date: 2018-04-23 12:51:29
                  UPDATE