WITH

Results: 671344



#Item
381Cameras / Rylo / 360-degree video

Product Fact Sheet Product: Rylo Availability: rylo.com and amazon.com. US only. International coming soon. MSRP: $USD Description: Rylo is a groundbreaking camera designed with powerful software that makes it eas

Add to Reading List

Source URL: www.rylo.com

Language: English - Date: 2018-08-20 14:27:51
382Computing / Computer architecture / Concurrent computing / Formal methods / Theoretical computer science / Cache coherency / Instruction set architectures / Concurrency / TLA+ / Model checking / Cache coherence / Specification language

Checking Cache-Coherence Protocols with TLA+ Rajeev Joshi HP Labs, Systems Research Center, Palo Alto, CA. Leslie Lamport Microsoft Research, Mountain View, CA.

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:46:20
383Economy / Finance / Money / Stock market / Funds / Investment / Corruption / Pump and dump / Spamming / Security / Investment fund / Crowdfunding

A r e Yo u A n I n f o r m e d I n v e s t o r ? Marijuana-Related Investments: Greener Pastures or Just Another Scam? You know the pitch – “Don’t miss out on this once-in-a-lifetime investment opportunity with gre

Add to Reading List

Source URL: www.avoidthescam.net

Language: English - Date: 2018-10-23 10:29:14
384Software testing / Software engineering / Model checkers / Computing / Theoretical computer science / Formal methods / Model checking / Formal verification / Random testing / Test automation / SPIN model checker / Acceptance testing

Putting Flight Software Through the Paces with Testing, Model Checking, and Constraint-Solving Alex Groce1 , Gerard Holzmann1 , Rajeev Joshi1 , and Ru-Gang Xu2 1

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:30:43
385Statistical randomness / Meteorology / Scheduling algorithms / Operations research / Computing / Network performance / Computer networking / Abstract data types / Queue / Monitor / FIFO / Scheduling

Catching the Microburst Culprits with Snappy Xiaoqi Chen Princeton University

Add to Reading List

Source URL: www.research.att.com

Language: English - Date: 2018-10-24 08:56:38
386Intellectual property law / Copyright law / Data / Copyright law of the United States / Copyright / Derivative work / Institute of Electrical and Electronics Engineers / Law / Author / Information / Copyright Act of Ghana / Authorship and ownership in copyright law in Canada

IEEE COPYRIGHT LICENSE FORM FOR LIMITED USE WITH IEEE COMPUTER SOCIETY’S EXPERIMENTAL “DELAYED-OPEN ACCESS” MODEL TITLE OF WORK (hereinafter, "the Work"): AUTHOR(S): IEEE PUBLICATION TITLE: 2017 IEEE Symposium on S

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-03-16 07:17:53
387Data management / Computing / Information retrieval / SQL / Relational database management systems / Query languages / Database management systems / Select / SQL syntax / Null

Automatically Synthesizing SQL Queries from Input-Output Examples Sai Zhang University of Washington Joint work with: Yuyin Sun

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:35
388Cryptocurrencies / Cryptography / Computing / Blockchains / Economy / Decentralization / Alternative currencies / Cryptographic protocols / Secure multi-party computation / Bitcoin / Digital signature / Ledger

Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers Gabriel Kaptchuk Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-04-16 15:01:50
389Economy / Business / Graphical user interface / Software architecture / Workflow

Automatically Repairing Broken Workflows for Evolving GUI Applications Sai Zhang University of Washington Joint work with: Hao Lü, Michael D. Ernst

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:35
390Cyberwarfare / Cybercrime / Cyberspace / Computer network security / Cyberattacks / Denial-of-service attacks / Denial-of-service attack / Ransomware / WannaCry ransomware attack / DDoS mitigation / Computer security / Petya

360 aerial view of Bangkok Thailand skyline city with business area abd highway transportaion traffic jam. Bangkok have a beautifull night life in Thailand.

Add to Reading List

Source URL: ns-cdn.neustar.biz

Language: English - Date: 2018-08-14 10:06:32
UPDATE