The

Results: 5344724



#Item
331Technology / Internet of things / Vehicle telematics / Transport / Emerging technologies / Economy of Japan / Toyota / Toyota Group / Motorola / Connected car / Mobility as a service / Carsharing

R&D activities Vehicle Communications R&D to connect vehicles to everything (V2X) We conduct research and development of technologies to connect the nextgeneration connected vehicles to everything else via radio or elect

Add to Reading List

Source URL: www.toyota-itc.com

Language: English - Date: 2018-06-01 01:59:13
332

Rob Rogers, Pittsburgh Post-Gazette / Courtesy of AAEC Draw your own conclusions Study the drawing and add a caption to this wordless cartoon. There is no wrong answer, so just be creative!

Add to Reading List

Source URL: nieonline.com

- Date: 2018-06-15 22:44:54
    333Metaphysics / Learning / Child development / Grasp / Ontology / Aptitude / Motor control / Motor skills / Palmar grasp reflex / Fine motor skill / Thumb / Taxonomy

    66 IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, VOL. 46, NO. 1, FEBRUARY 2016 The GRASP Taxonomy of Human Grasp Types Thomas Feix, Javier Romero, Heinz-Bodo Schmiedmayer, Aaron M. Dollar, and Danica Kragic

    Add to Reading List

    Source URL: www.is.mpg.de

    Language: English - Date: 2016-02-22 05:50:31
    334Economy / Finance / Entrepreneurship / Money / Private equity / Cryptocurrencies / Corporate finance / Equity securities / Blockchain / Venture capital / Startup company / Maktoob

    Press Release: London, UK. July 24, 2018 Jabbar announces the launch of new Fintech company Kambio Ventures Kambio’s blockchain-enabled, fully-regulated platform will be a nextgeneration exchange dedicated to start-up

    Add to Reading List

    Source URL: www.kambio.io

    Language: English - Date: 2018-10-10 01:39:01
    335Economy / Finance / Business / Entrepreneurship / Angel investors / EBAN / Private equity / Venture capital / Crowdfunding / Baybars Altunta

    The EBAN Global Network

    Add to Reading List

    Source URL: www.eban.org

    Language: English - Date: 2018-02-06 10:04:19
    336Computer programming / Computing / Mathematics / Theoretical computer science / Boolean algebra / Error detection and correction / Compiler construction / Hash function / Avalanche effect / Optimizing compiler / Recursion / MD5

    Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:44
    337Concurrent computing / Computing / Distributed computing / Computer networking / Distributed data storage / Peer-to-peer computing / Cloud storage / Content delivery networks / Content delivery network / Dynamic site acceleration / Fastly / Dedicated hosting service

    Fastly Managed CDN A custom, fully managed CDN solution on your network Why consider a managed CDN? The use of managed content delivery networks (CDNs) are on the rise,

    Add to Reading List

    Source URL: www.fastly.com

    Language: English
    338Cryptography / Distributed computing architecture / Parallel computing / MapReduce / Certificate / IP / NP / Commitment scheme / PP / Computational complexity theory

    Verifying computations with state Benjamin Braun, Ariel J. Feldman⋆ , Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin ⋆ University of Pennsylvania Abstract When

    Add to Reading List

    Source URL: www.pepper-project.org

    Language: English - Date: 2017-11-11 14:59:54
    339Software / Computing / System software / Instant messaging clients / Internet privacy / Cross-platform software / Cryptographic software / Public key infrastructure / Email encryption / IMessage / Secure communication / Threema

    Obstacles to the Adoption of Secure Communication Tools Ruba Abu-Salma M. Angela Sasse

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 16:01:17
    340Computing / Cyberwarfare / Software / Cybercrime / Botnets / Denial-of-service attacks / Linux malware / Cryptographic software / Secure Shell / Xor DDoS / OpenSSH / File Transfer Protocol

    Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets Christophe Tafani-Dereeper @christophetd

    Add to Reading List

    Source URL: grehack.fr

    Language: English - Date: 2017-11-19 15:28:31
    UPDATE