Seth Thomas

Results: 22



#Item
1Seth Thomas Seth Thomas

Seth Thomas Seth Thomas

Add to Reading List

Source URL: abbeyclock.com

Language: English - Date: 2013-05-28 12:01:22
    2Seth Thomas Seth Thomas 89 Sessions Clock

    Seth Thomas Seth Thomas 89 Sessions Clock

    Add to Reading List

    Source URL: abbeyclock.com

    Language: English - Date: 2013-05-28 12:01:23
      3Tweakable Blockciphers with Beyond Birthday-Bound Security Will Landecker, Thomas Shrimpton, and R. Seth Terashima Dept. of Computer Science, Portland State University {landeckw,teshrim,seth}@cs.pdx.edu

      Tweakable Blockciphers with Beyond Birthday-Bound Security Will Landecker, Thomas Shrimpton, and R. Seth Terashima Dept. of Computer Science, Portland State University {landeckw,teshrim,seth}@cs.pdx.edu

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2014-02-20 14:22:41
        4A Provable-Security Analysis of Intel’s Secure Key RNG Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu  Abstract. We provide the first provable-secu

        A Provable-Security Analysis of Intel’s Secure Key RNG Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu Abstract. We provide the first provable-secu

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-02-17 19:30:26
          5Inferring Maps and Behaviors from Natural Language Instructions Felix Duvallet?1 , Matthew R. Walter?2 , Thomas Howard?2 , Sachithra Hemachandra?2 , Jean Oh1 , Seth Teller2 , Nicholas Roy2 , and Anthony Stentz1 1

          Inferring Maps and Behaviors from Natural Language Instructions Felix Duvallet?1 , Matthew R. Walter?2 , Thomas Howard?2 , Sachithra Hemachandra?2 , Jean Oh1 , Seth Teller2 , Nicholas Roy2 , and Anthony Stentz1 1

          Add to Reading List

          Source URL: ttic.uchicago.edu

          Language: English - Date: 2014-11-19 14:27:00
          6Approaching the Symbol Grounding Problem with Probabilistic Graphical Models Stefanie Tellex1 and Thomas Kollar1 and Steven Dickerson and Matthew R. Walter and Ashis Gopal Banerjee and Seth Teller and Nicholas Roy Comput

          Approaching the Symbol Grounding Problem with Probabilistic Graphical Models Stefanie Tellex1 and Thomas Kollar1 and Steven Dickerson and Matthew R. Walter and Ashis Gopal Banerjee and Seth Teller and Nicholas Roy Comput

          Add to Reading List

          Source URL: ttic.uchicago.edu

          Language: English - Date: 2014-11-19 14:27:01
          7Seth Thomas Seth Thomas

          Seth Thomas Seth Thomas

          Add to Reading List

          Source URL: www.abbeyclock.com

          Language: English - Date: 2013-05-28 12:01:22
          8Southern Calendar Clock Southern Calendar Clock This Southern Calendar clock is from the 1890s. Its calendar is similar to that of the Ithaca

          Southern Calendar Clock Southern Calendar Clock This Southern Calendar clock is from the 1890s. Its calendar is similar to that of the Ithaca

          Add to Reading List

          Source URL: www.abbeyclock.com

          Language: English - Date: 2013-05-28 12:01:23
          9A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu

          A Modular Framework for Building Variable-Input-Length Tweakable Ciphers Thomas Shrimpton and R. Seth Terashima Dept. of Computer Science, Portland State University {teshrim,seth}@cs.pdx.edu

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2014-08-22 14:42:30
          10Seth Thomas Seth Thomas 89 Sessions Clock

          Seth Thomas Seth Thomas 89 Sessions Clock

          Add to Reading List

          Source URL: www.abbeyclock.com

          Language: English - Date: 2013-05-28 12:01:23