Matthias

Results: 3580



#Item
961

FRANCESCA MININI Matthias Bitzer and Francesco Simeti Exhibition view at Art Basel Miami Beach, 2013 Miami FRANCESCA MININI

Add to Reading List

Source URL: www.francescaminini.it

- Date: 2014-06-24 05:55:31
    962Cyberwarfare / Computer network security / Denial-of-service attacks / Computer networking / Named data networking / Interest Flooding Attack / Denial-of-service attack / Forwarding plane / Computer network / Computer security

    Revisiting Countermeasures Against NDN Interest Flooding Samir Al-Sheikh Matthias Wählisch

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-01 13:27:13
    963

    Hierarchy-Regularized Latent Semantic Indexing Yi Huang1 , Kai Yu2 , Matthias Schubert1 , Shipeng Yu1 , Volker Tresp2 , Hans-Peter Kriegel1 1 Institute for Computer Science, University of Munich 2 Siemens Corporate Techn

    Add to Reading List

    Source URL: www.dbs.informatik.uni-muenchen.de

    Language: English - Date: 2006-03-31 08:31:41
      964

      Nomadic Honeypots: A Novel Concept for Smartphone Honeypots Steffen Liebergeld1 , Matthias Lange1 , and Collin Mulliner2 1 Security in Telecommunications, Technische Universit¨at Berlin, {steffen,mlange}@sec.t-labs.tu-

      Add to Reading List

      Source URL: www.mostconf.org

      Language: English - Date: 2013-04-19 23:56:06
        965Computing / Security / Hypervisor / Graphics processing unit / Computer security

        Graphical User Interface for Virtualized Mobile Handsets Janis Danisevskis, Michael Peter, Jan Nordholz, Matthias Petschick, Julian Vetter Security in Telecommunications

        Add to Reading List

        Source URL: ieee-security.org

        Language: English - Date: 2015-05-30 16:28:27
        966

        Noname manuscript No. (will be inserted by the editor) How Robots Can Affect Human Behavior: Investigating the Effects of Robotic Displays of Protest and Distress Gordon Briggs · Matthias Scheutz

        Add to Reading List

        Source URL: hrilab.tufts.edu

        Language: English - Date: 2014-06-01 02:05:58
          967

          The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware Matthias Vallentin3 , Robin Sommer2,1 , Jason Lee2 , Craig Leres2 , Vern Paxson1,2, and Brian Tierney2 1 2

          Add to Reading List

          Source URL: matthias.vallentin.net

          Language: English - Date: 2016-03-04 12:19:03
            968

            A Contextual Account of Staged Computations Brigitte Pientka Matthias Puech McGill University, Canada

            Add to Reading List

            Source URL: www.pps.univ-paris-diderot.fr

            Language: English - Date: 2014-10-31 13:46:15
              969

              Auditory Habituation via Spike-Timing Dependent Plasticity in Recurrent Neural Circuits Richard Veale Matthias Scheutz

              Add to Reading List

              Source URL: hrilab.tufts.edu

              Language: English - Date: 2013-01-04 17:46:18
                970

                From Natural Deduction to the Sequent Calculus by passing an accumulator Matthias Puech

                Add to Reading List

                Source URL: www.pps.univ-paris-diderot.fr

                Language: English - Date: 2013-08-26 07:29:30
                  UPDATE