Scott

Results: 22067



#Item
21Software / Computing / Computer-mediated communication / Instant messaging clients / Social media / Videotelephony / Computer access control / Cross-platform software / Signal / WhatsApp / Instant messaging / Authentication

Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 03:43:28
22Theoretical computer science / Logic / Mathematical logic / Logic in computer science / Formal methods / Programming language semantics / Philosophical logic / Models of computation / Operational semantics / Denotational semantics / Standard ML / Kripke semantics

Functional Big-step Semantics Scott Owens1 , Magnus O. Myreen2 , Ramana Kumar3 , and Yong Kiam Tan4 1 2

Add to Reading List

Source URL: cakeml.org

Language: English - Date: 2016-03-19 19:42:58
23Self-regulatory organizations / Economy / Finance / Money / Fixed income / Inter-dealer broker / Swap Execution Facility / GFI Group / TP ICAP / NEX Group / BGC Partners / Futures contract

  WMBAA Announces Former CFTC Commissioner Scott O’Malia to Speak at SEFCON V Additional speakers added to panels looking at the first full year of SEF trading, SEF viability, cross border issues and technological so

Add to Reading List

Source URL: www.wmbaa.com

Language: English - Date: 2015-02-20 10:34:17
24Computability theory / Models of computation / Theoretical computer science / Software engineering / Scope / Lambda calculus / Computing

Extensible Access Control with Authorization Contracts Scott Moore Christos Dimoulas Robert Bruce Findler

Add to Reading List

Source URL: www.ece.northwestern.edu

Language: English - Date: 2016-10-10 16:16:25
25Elections in the United States / Elections / Ken Detzner / Voter registration / Politics / Political corruption / Political corruption in the United States / Voter suppression / Voter registration in the United States

RICK SCOTT Governor KEN DETZNER Secretary of State

Add to Reading List

Source URL: dos.myflorida.com

Language: English - Date: 2018-10-09 09:33:33
26Mathematical logic / Metalogic / Logic / Model theory / Logic in computer science / Proof theory / Proof assistants / Programming language semantics / HOL / Operational semantics / Gdel's completeness theorem / Type theory

HOL with Definitions: Semantics, Soundness, and a Verified Implementation Ramana Kumar1 , Rob Arthan2 , Magnus O. Myreen1 , and Scott Owens3 2 1

Add to Reading List

Source URL: cakeml.org

Language: English - Date: 2014-04-20 08:49:44
27International relations / Global politics / United Nations peacekeeping / Peacekeeping / Structure / Center on International Cooperation / United Nations / Common Security and Defence Policy / Humanitarian intervention / African Union

Marina E. Henke Ph.D. Northwestern University Scott Hall, 601 University Pl., Evanston, IL, www.marinahenke.com

Add to Reading List

Source URL: www.marinahenke.com

Language: English - Date: 2018-09-12 10:15:53
28Type theory / Software engineering / Programming language theory / Computing / Type system / Unification / HindleyMilner type system / Standard ML / System F / ML / Type inference / Generics in Java

A Verified Type System for CakeML Yong Kiam Tan Scott Owens IHPC, A*STAR

Add to Reading List

Source URL: cakeml.org

Language: English - Date: 2016-09-08 10:14:27
29Software engineering / Computer programming / Computing / Proof assistants / Logic in computer science / Functional languages / Automated theorem proving / Theoretical computer science / HOL / Logic for Computable Functions / Automated reasoning / ML

Steps Towards Verified Implementations of HOL Light Magnus O. Myreen1 , Scott Owens2 , and Ramana Kumar1 1 Computer Laboratory, University of Cambridge, UK

Add to Reading List

Source URL: cakeml.org

Language: English - Date: 2013-05-10 10:01:51
30Computing / Internet architecture / Network architecture / Information and communications technology / Routing / Computer networking / Internet protocols / Border Gateway Protocol / IP routing / Route reflector / Open Shortest Path First / Router

A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jennifer Rexford††, Scott Shenke

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2012-10-14 18:59:05
UPDATE