Sam

Results: 11151



#Item
1Theoretical computer science / Lambda calculus / Inter-process communication / Software engineering / Mathematical logic / Combinatory logic / Logic in computer science / Futures and promises / Evaluation strategy / Evaluation / Monitor / Futures contract

Contract Monitoring Semantics as Patterns of Communication Cameron Swords Amr Sabry Sam Tobin-Hochstadt

Add to Reading List

Source URL: homes.sice.indiana.edu

Language: English - Date: 2015-02-28 14:55:06
2Computing / Computer security / World Wide Web / Internet privacy / Internet censorship / Content-control software / Digital rights management / HTTP cookie / Ad blocking / Web server / Same-origin policy / Web crawler

arXiv:1410.1211v2 [cs.NI] 19 JulEncore: Lightweight Measurement of Web Censorship with Cross-Origin Requests Sam Burnett Georgia Tech

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-07-20 20:26:37
3

Practical Optional Types for Clojure Ambrose Bonnaire-Sergeant Rowan Davies Sam Tobin-Hochstadt

Add to Reading List

Source URL: homes.sice.indiana.edu

Language: English - Date: 2015-02-28 14:55:07
    4Coral reefs / Physical geography / Fishing / Oceanography / Coral reef / Coral / Marine protected area / Reef / Coral reef organizations / Coral bleaching

    Final Am Sam Capacity Assessment Small

    Add to Reading List

    Source URL: www.coris.noaa.gov

    Language: English - Date: 2016-03-24 14:31:16
    5Computing / Internet privacy / Software / Technology / Internet censorship / Text messaging / Email / Internet censorship circumvention / Freenet / Deep packet inspection / Steganography / SMS

    Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu Abstract

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2010-06-03 17:05:03
    6Software engineering / Computing / Programming language theory / Type theory / Type systems / Lambda calculus / Subroutines / Data types / Gradual typing / Racket / Go / Programming language

    Migratory Typing: Ten Years Later∗ Sam Tobin-Hochstadt1 , Matthias Felleisen2 , Robert Bruce Findler3 , Matthew Flatt4 , Ben Greenman5 , Andrew M. Kent6 , Vincent St-Amour7 , T. Stephen Strickland8 , and Asumu Takikawa

    Add to Reading List

    Source URL: www.ece.northwestern.edu

    Language: English - Date: 2017-05-11 23:26:18
    7Computing / Hacking / Human behavior / Information and communications technology / Telephone tapping / Computer programming / Hacker / Internet security / Wargame / Security hacker

    Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t

    Add to Reading List

    Source URL: afnom.net

    Language: English - Date: 2018-10-16 09:54:50
    8CTFS / Capture the flag / Shellcode / Human behavior / Recreation

    AFiniteNumberOfMonkeys Organising monkeys or How to run a hacking club Andreea-Ina Radu, Sam L. Thomas

    Add to Reading List

    Source URL: afnom.net

    Language: English - Date: 2018-10-16 09:54:50
    9Type theory / Software engineering / Programming language theory / Computing / Scheme / System F / Type system / HindleyMilner type system / Racket / Boolean data type / Macro / Typing environment

    Higher-Order and Symbolic Computation manuscript No. (will be inserted by the editor) The Design and Implementation of Typed Scheme: From Scripts to Programs? Sam Tobin-Hochstadt · Matthias Felleisen

    Add to Reading List

    Source URL: homes.sice.indiana.edu

    Language: English - Date: 2013-08-15 14:47:07
    10Computing / Internet / Internet protocols / Network architecture / Internet privacy / Internet security / Internet Standards / Network protocols / Hypertext Transfer Protocol / SOCKS / HTTP cookie / World Wide Web

    Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Ben Jones Sam Burnett Nick Feamster Sean Donovan Sarthak Grover Sathya Gunasekaran Karim Habak

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2016-02-20 04:48:06
    UPDATE