Thomas

Results: 44972



#Item
11Theoretical computer science / Stochastic processes / Formal languages / Logic in computer science / Stochastic simulation / Rewriting

MeCBICTranslating Stochastic CLS into Maude Thomas Anung Basukia,b,1 Antonio Ceronea,2 Paolo Milazzob,3 a

Add to Reading List

Source URL: pages.di.unipi.it

Language: English - Date: 2015-12-18 06:55:15
12Metaphysics / Learning / Child development / Grasp / Ontology / Aptitude / Motor control / Motor skills / Palmar grasp reflex / Fine motor skill / Thumb / Taxonomy

66 IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, VOL. 46, NO. 1, FEBRUARY 2016 The GRASP Taxonomy of Human Grasp Types Thomas Feix, Javier Romero, Heinz-Bodo Schmiedmayer, Aaron M. Dollar, and Danica Kragic

Add to Reading List

Source URL: www.is.mpg.de

Language: English - Date: 2016-02-22 05:50:31
13

SWIFT: Predictive Fast Reroute∗ Thomas Holterbach Stefano Vissicchio ETH Zürich; CAIDA, UC San Diego

Add to Reading List

Source URL: nsg.ee.ethz.ch

Language: English - Date: 2017-08-09 10:39:13
    14Food and Drug Administration / Health / Federal Food /  Drug /  and Cosmetic Act / Center for Tobacco Products

    October 12, 2018 VIA UPS and Electronic Mail Mr. Thomas Vo Chief Executive Officer Vertigo Vapor LLCNortheast 91st Street

    Add to Reading List

    Source URL: www.fda.gov

    Language: English
    15Theoretical computer science / Mathematics / Logic in computer science / Proof theory / Programming language semantics / Metalogic / Model theory / Symbol / Net / Constructible universe / Sequent / Permutation

    From Non-preemptive to Preemptive Scheduling using Synchronization Synthesis ⋆ ˇ Pavol Cern´ y1 , Edmund M. Clarke2 , Thomas A. Henzinger3 , Arjun 4

    Add to Reading List

    Source URL: www.cs.purdue.edu

    Language: English - Date: 2016-07-15 23:00:36
    16Cryptography / Public-key cryptography / Proxy re-encryption / ID-based encryption / Homomorphic encryption / ElGamal encryption / Chosen-ciphertext attack / Encryption / RSA / Key / Symmetric-key algorithm / Identity-based conditional proxy re-encryption

    Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications David Derler1 , Stephan Krenn2 , Thomas Lor¨ unser2 , Sebastian Ramacher1 , 2 Daniel Slamanig , and Christoph Striecks2

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2018-05-03 11:03:06
    17Computing / Computer memory / Hardware acceleration / Central processing unit / Parallel computing / Computer hardware / Dynamic random-access memory / Computer architecture / Field-programmable gate array

    FPGAs as Streaming MIMD Machines for Data Analy9cs James Thomas, Matei Zaharia, Pat Hanrahan CPU/GPU Control Flow Divergence

    Add to Reading List

    Source URL: platformlab.stanford.edu

    Language: English - Date: 2018-06-18 15:29:45
    18Graph theory / Mathematics / Discrete mathematics / Degree / Graph / Orientation / Operad theory / Euler characteristic / Directed graph / Two-graph / Hanoi graph

    Proc. Int. Cong. of Math. – 2018 Rio de Janeiro, Vol–1260) LITTLE DISKS OPERADS AND FEYNMAN DIAGRAMS Thomas Willwacher

    Add to Reading List

    Source URL: eta.impa.br

    Language: English - Date: 2018-07-25 13:17:42
    19Terms of service / Identity management / Law / Privacy / Internet privacy / Attitude / Social psychology / Medical privacy / Psychology / Behavior

    Poster: Why Privacy is All But Forgotten An Empirical Study of Privacy & Sharing Attitude Kovila P.L. Coopamootoo and Thomas Groß I. I NTRODUCTION Privacy and sharing are believed to share a dynamic and

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 16:46:26
    20

    SWIFT: Predictive Fast Reroute∗ Thomas Holterbach Stefano Vissicchio ETH Zürich; CAIDA, UC San Diego

    Add to Reading List

    Source URL: swift.ethz.ch

    Language: English - Date: 2017-09-11 06:28:39
      UPDATE