The Adversary

Results: 500



#Item
21Optimal Projective Algorithms for the List Update Problem Christoph Amb¨uhl1 , Bernd G¨artner1 , and Bernhard von Stengel2 1  Institute for Theoretical Computer Science, ETH Z¨urich, 8092 Z¨urich, Switzerland.

Optimal Projective Algorithms for the List Update Problem Christoph Amb¨uhl1 , Bernd G¨artner1 , and Bernhard von Stengel2 1 Institute for Theoretical Computer Science, ETH Z¨urich, 8092 Z¨urich, Switzerland.

Add to Reading List

Source URL: www.maths.lse.ac.uk

Language: English - Date: 2010-01-11 12:21:35
22Transiting Areas Patrolled by a Mobile Adversary Ondˇrej Vanˇek, Branislav Boˇsansk´y, Michal Jakob and Michal Pˇechouˇcek which it chooses a closed-walk starting and ending in a given location in the area, termed

Transiting Areas Patrolled by a Mobile Adversary Ondˇrej Vanˇek, Branislav Boˇsansk´y, Michal Jakob and Michal Pˇechouˇcek which it chooses a closed-walk starting and ending in a given location in the area, termed

Add to Reading List

Source URL: game.itu.dk

Language: English - Date: 2010-08-10 12:41:00
23Theoretical Computer Science–16  www.elsevier.com/locate/tcs A new lower bound for the list update problem in the partial cost model

Theoretical Computer Science–16 www.elsevier.com/locate/tcs A new lower bound for the list update problem in the partial cost model

Add to Reading List

Source URL: www.maths.lse.ac.uk

Language: English - Date: 2002-11-18 18:10:24
24S A N S  Stop being blind to the adversary – Arm your incident response team today!

S A N S Stop being blind to the adversary – Arm your incident response team today!

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-05-14 12:50:46
    25S A N S  Stop being blind to the adversary – Arm your incident response team today!

    S A N S Stop being blind to the adversary – Arm your incident response team today!

    Add to Reading List

    Source URL: digital-forensics.sans.org

    Language: English - Date: 2015-05-14 12:50:46
      26Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief Daniel Steinmetzer Matthias Schulz

      Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief Daniel Steinmetzer Matthias Schulz

      Add to Reading List

      Source URL: www.informatik.tu-darmstadt.de

      Language: English - Date: 2015-05-13 06:54:01
        27U.S. BAl\Jl(RUPTCV COURT SOUTHERN DISTRICT OF MISSISSIPPIUNITED STATES BANKRUPTCY COURT SOUTHERN DISTRICT OF MISSISSIPPI

        U.S. BAl\Jl(RUPTCV COURT SOUTHERN DISTRICT OF MISSISSIPPIUNITED STATES BANKRUPTCY COURT SOUTHERN DISTRICT OF MISSISSIPPI

        Add to Reading List

        Source URL: www.mssb.uscourts.gov

        Language: English - Date: 2015-03-27 15:33:32
        28RulePROOF OF SERVICE IN BANKRUPTCY CASES, ADVERSARY PROCEEDINGS, AND CONTESTED MATTERS (a) Applicability. This rule applies to proofs of service required by the Federal Rules

        RulePROOF OF SERVICE IN BANKRUPTCY CASES, ADVERSARY PROCEEDINGS, AND CONTESTED MATTERS (a) Applicability. This rule applies to proofs of service required by the Federal Rules

        Add to Reading List

        Source URL: www.flmb.uscourts.gov

        Language: English - Date: 2015-06-30 16:22:40
          29The Science of Security  On Adversary Models and Compositional Security  A unified view of a wide range of adversary classes and

          The Science of Security On Adversary Models and Compositional Security A unified view of a wide range of adversary classes and

          Add to Reading List

          Source URL: www.andrew.cmu.edu

          Language: English - Date: 2016-02-12 12:31:56
            30United States Bankruptcy Court Danny L. Miller Clerk of Court Southern District of Mississippi

            United States Bankruptcy Court Danny L. Miller Clerk of Court Southern District of Mississippi

            Add to Reading List

            Source URL: www.mssb.uscourts.gov

            Language: English - Date: 2015-04-20 16:47:10