−1

Results: 1637835



#Item
241From Lone Dwarfs to Giant Superclusters: Rethinking Operating System Abstractions for the Cloud Nikos Vasilakis, Ben Karel, Jonathan M. Smith The University of Pennsylvania  1

From Lone Dwarfs to Giant Superclusters: Rethinking Operating System Abstractions for the Cloud Nikos Vasilakis, Ben Karel, Jonathan M. Smith The University of Pennsylvania 1

Add to Reading List

Source URL: nikos.vasilak.is

Language: English - Date: 2016-02-21 03:35:18
242ECE/CS498: Applied Cryptography  Instructor: Andrew Miller, TA: Kevin Liao Lecture 1: Group Theory 1

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 1: Group Theory 1

Add to Reading List

Source URL: gitlab-beta.engr.illinois.edu

Language: English
243SAFEWEB: A Middleware for Securing Ruby-based Web Applications Petr Hosek1 , Matteo Migliavacca1 , Ioannis Papagiannis1 , David M. Eyers2 , David Evans3 , Brian Shand4 , Jean Bacon3 , and Peter Pietzuch1 1

SAFEWEB: A Middleware for Securing Ruby-based Web Applications Petr Hosek1 , Matteo Migliavacca1 , Ioannis Papagiannis1 , David M. Eyers2 , David Evans3 , Brian Shand4 , Jean Bacon3 , and Peter Pietzuch1 1

Add to Reading List

Source URL: srg.doc.ic.ac.uk

Language: English - Date: 2011-12-01 05:00:04
244U Network: A Decentralized Protocol for Publishing and Valuing Online Content White Paper Version 1.0.3

U Network: A Decentralized Protocol for Publishing and Valuing Online Content White Paper Version 1.0.3

Add to Reading List

Source URL: u.network

Language: English - Date: 2018-08-30 22:14:37
245Privacy Policy Your privacy is important to “AIC NETWORK PTE. LTD.” (“company”, “us”, “our”, or “we”). We’ve created this privacy policy (“Privacy Policy”) to cover: 1. Personal information you

Privacy Policy Your privacy is important to “AIC NETWORK PTE. LTD.” (“company”, “us”, “our”, or “we”). We’ve created this privacy policy (“Privacy Policy”) to cover: 1. Personal information you

Add to Reading List

Source URL: aicrypto.ai

Language: English - Date: 2018-09-02 21:47:49
246Frequency Estimation of Virtual Call Targets for Object-Oriented Programs Cheng Zhang1 , Hao Xu2, , Sai Zhang3 , Jianjun Zhao1,2 , and Yuting Chen2 1  Department of Computer Science and Engineering, Shanghai Jiao Tong U

Frequency Estimation of Virtual Call Targets for Object-Oriented Programs Cheng Zhang1 , Hao Xu2, , Sai Zhang3 , Jianjun Zhao1,2 , and Yuting Chen2 1 Department of Computer Science and Engineering, Shanghai Jiao Tong U

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
247PtCFR Ch. XIV (7–1–16 Edition) calculation is necessary to comply with this requirement.

PtCFR Ch. XIV (7–1–16 Edition) calculation is necessary to comply with this requirement.

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2018-08-14 11:48:05
248Luna Andre Ornish, Vinay Gupta, Aella, Dr. Aeron Buchanan Draft 1 · 24 October 2017 Abstract Online dating has emerged as one of the most extensive and still-growing online industries, but user experience remains poor d

Luna Andre Ornish, Vinay Gupta, Aella, Dr. Aeron Buchanan Draft 1 · 24 October 2017 Abstract Online dating has emerged as one of the most extensive and still-growing online industries, but user experience remains poor d

Add to Reading List

Source URL: lunalabs.github.io

Language: English - Date: 2018-10-23 22:44:24
249454766_1_En_1_PartFrontmatter 1..1

454766_1_En_1_PartFrontmatter 1..1

Add to Reading List

Source URL: link.springer.com

- Date: 2017-08-28 05:43:33
    250The Sum Can Be Weaker Than Each Part? Ga¨etan Leurent1 and Lei Wang2 1 2

    The Sum Can Be Weaker Than Each Part? Ga¨etan Leurent1 and Lei Wang2 1 2

    Add to Reading List

    Source URL: who.rocq.inria.fr

    Language: English - Date: 2018-06-14 07:12:40