Institute of Engineering

Results: 17160



#Item
1in Knowledge Engineering Reviews, 2001  Synthesis of EÆcient Constraint Satisfaction Programs Stephen J. Westfold and Douglas R. Smith Kestrel Institute 3260 Hillview Avenue

in Knowledge Engineering Reviews, 2001 Synthesis of EÆcient Constraint Satisfaction Programs Stephen J. Westfold and Douglas R. Smith Kestrel Institute 3260 Hillview Avenue

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-02 20:59:14
2BOXES: Abstract Domain of Boxes  Arie Gurfinkel and Sagar Chaki Software Engineering Institute Carnegie Mellon University January 28, 2011

BOXES: Abstract Domain of Boxes Arie Gurfinkel and Sagar Chaki Software Engineering Institute Carnegie Mellon University January 28, 2011

Add to Reading List

Source URL: arieg.bitbucket.io

Language: English - Date: 2018-10-19 18:15:18
3Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 08:13:56
4Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Poster:A New Approach to Detecting Ransomware with Deception Yun Feng, Chaoge Liu, Baoxu Liu Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chinese Academy of

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-24 15:44:20
5Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2  Institute of Information Engineering, Chinese Academy of Sciences

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
6Look Before You Shame: A Study on Shaming Activities on Twitter Rajesh Basak, Niloy Ganguly, Shamik Sural, Soumya K Ghosh Department of Computer Science & Engineering, Indian Institute of Technology Kharagpur Kharagpur,

Look Before You Shame: A Study on Shaming Activities on Twitter Rajesh Basak, Niloy Ganguly, Shamik Sural, Soumya K Ghosh Department of Computer Science & Engineering, Indian Institute of Technology Kharagpur Kharagpur,

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:23:08
7For the DISTINCT Clause of SPARQL Queries Medha Atre Dept. of Computer Science and Engineering Indian Institute of Technology, Kanpur, India

For the DISTINCT Clause of SPARQL Queries Medha Atre Dept. of Computer Science and Engineering Indian Institute of Technology, Kanpur, India

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:50:47
8A Relational Encoding for a Clash-Free Subset of ASMs Gerhard Schellhorn, Gidon Ernst, J¨org Pf¨ahler, and Wolfgang Reif Institute for Software and Systems Engineering University of Augsburg, Germany {schellhorn,ernst,

A Relational Encoding for a Clash-Free Subset of ASMs Gerhard Schellhorn, Gidon Ernst, J¨org Pf¨ahler, and Wolfgang Reif Institute for Software and Systems Engineering University of Augsburg, Germany {schellhorn,ernst,

Add to Reading List

Source URL: www.isse.uni-augsburg.de

Language: English - Date: 2017-01-11 10:50:05
9Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Poster: Detecting Command and Control Servers of Botnet With Randomized Traffic Di Wu1,2, Binxing Fang3, Fangjiao Zhang1,2 1 (Institute of Information Engineering, Chinese Academy of Sciences) 2 (School of Cyber Security

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-11 13:01:38
101  Postquantum SSL/TLS for embedded systems Yun-An Chang† , Ming-Shing Chen†‡ , Jong-shian Wu† , Bo-Yin Yang‡ , of Electrical Engineering, National Taiwan University, Taiwan ‡ Institute of Information Science

1 Postquantum SSL/TLS for embedded systems Yun-An Chang† , Ming-Shing Chen†‡ , Jong-shian Wu† , Bo-Yin Yang‡ , of Electrical Engineering, National Taiwan University, Taiwan ‡ Institute of Information Science

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2014-12-08 15:44:41