Matthew

Results: 11665



#Item
1Digital typography / Typography / Typesetting / Writing / Web design / Web typography / World Wide Web / Digital media / Graphic design / Font / Google Fonts / TrueType

MB Type One-Person Font License (1) This license covers one person: you, the license owner. Below, I’ll shorten this to “you.” (2) I, Matthew Butterick (d/b/a MB Type), own the fonts delivered with this license. Be

Add to Reading List

Source URL: typographyforlawyers.com

Language: English - Date: 2016-07-29 13:14:17
2Computing / Internet / Statistical classification / Free software / Dark web / Secure communication / Tor / Relay / K-nearest neighbors algorithm / Outline of machine learning / Bandwidth / .tor

Poster: PredicTor: Predicting Fast Circuits For A Faster User Experience in Tor Armon Barton, Mohsen Imani, Matthew Wright, and Jiang Ming I. I NTRODUCTION Tor is a low-latency anonymity system designed for TCPbased appl

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 19:28:54
3

In Pursuit of Error: A Survey of Uncertainty Visualization Evaluation Jessica Hullman, Xiaoli Qiao, Michael Correll, Alex Kale, Matthew Kay Abstract—Understanding and accounting for uncertainty is critical to effective

Add to Reading List

Source URL: idl.cs.washington.edu

Language: English
    4Aircraft instruments / Aviation / Avionics / Technology / Electronics / ACARS / ARINC / VHF Data Link / SATCOM / Data link / Pilot report / Flight plan

    Economy Class Crypto: Exploring Weak Cipher Usage in Avionic Communications via ACARS Matthew Smith1 , Daniel Moser2 , Martin Strohmeier1 , Vincent Lenders3 , and Ivan Martinovic1 1

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2017-04-23 04:47:48
    5Electronics / Radio / Telecommunications engineering / Air traffic control / Avionics / OpenSky Network / Radar / Automatic dependent surveillance  broadcast / Wireless / Flightradar24 / Global Positioning System / Data integrity

    OpenSky Report 2018: Assessing the Integrity of Crowdsourced Mode S and ADS-B Data Matthias Sch¨afer¶‡∗ , Martin Strohmeier¶† , Matthew Smith¶† , Markus Fuchs¶‡ , Vincent Lenders¶§ , Ivan Martinovic¶†

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2018-08-23 02:40:40
    6Computer programming / Software engineering / Computing / Object-oriented programming languages / Functional languages / Data types / Functional programming / Scripting languages / Racket / Generator / Macro / Mutator method

    The Racket Reference Version 6.8 Matthew Flatt and PLT January 24, 2017

    Add to Reading List

    Source URL: download.racket-lang.org

    Language: English - Date: 2017-01-24 15:36:26
    7Aviation / Human behavior / Transport / Air traffic control / Terms of service / Automatic dependent surveillance  broadcast / Avionics / FlightAware / OpenSky Network / Internet privacy / Flightradar24 / Aircraft spotting

    The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication Martin Strohmeier∗ , Matthew Smith∗ , Vincent Lenders† , Ivan Martinovic∗ ∗ University of

    Add to Reading List

    Source URL: www.lenders.ch

    Language: English - Date: 2018-06-20 05:13:12
    8Cryptocurrencies / Blockchains / Concurrent computing / Ethereum / Distributed computing / Alternative currencies / Computing / Decentralization / Kin / ERC-20 / Smart contract / Decentralized application

    Loopring Decentralized token exchange protocol Analyst: Matthew Finestone

    Add to Reading List

    Source URL: loopring.org

    Language: English - Date: 2018-09-29 06:48:42
    9Spectral theory / Hermann Minkowski / Minkowski's second theorem / Operator theory / Mathematics / Dissipative operator

    A proof of Minkowski’s second theorem Matthew Tointon Minkowski’s second theorem is a fundamental result from the geometry of numbers with important applications in additive combinatorics (see, for example, its appli

    Add to Reading List

    Source URL: tointon.neocities.org

    Language: English - Date: 2017-05-18 16:55:52
    10Cybercrime / Computing / Human behavior / Cyberspace / Social engineering / Cyberwarfare / Phishing / Spamming / Social networking service / Facebook / Computer security / Transaction authentication number

    Poster: Phishing on Facebook Sovantharith Seng Mahdi Nasrullah Al-Ameen Matthew Wright

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 07:46:24
    UPDATE