Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5119
search results - page 115 / 1024
»
Security Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
97
click to vote
AGENTS
1997
Springer
92
views
Security Privacy
»
more
AGENTS 1997
»
Hide-and-Seek: Effective Use of Memory in Perception/Action Systems
15 years 8 months ago
Download
www.cs.virginia.edu
Glenn S. Wasson, Gabriel J. Ferrer, Worthy N. Mart...
claim paper
Read More »
110
Voted
CSFW
1996
IEEE
101
views
Security Privacy
»
more
CSFW 1996
»
A Logic of Composition for Information Flow Predicates
15 years 8 months ago
Download
www.cs.virginia.edu
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
claim paper
Read More »
107
Voted
CSFW
1996
IEEE
93
views
Security Privacy
»
more
CSFW 1996
»
Towards a model of storage jamming
15 years 8 months ago
Download
www.cs.fsu.edu
John P. McDermott, David M. Goldschlag
claim paper
Read More »
69
click to vote
CCS
1997
ACM
81
views
Security Privacy
»
more
CCS 1997
»
Proactive Public Key and Signature Systems
15 years 8 months ago
Download
www.informatics.indiana.edu
Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki...
claim paper
Read More »
98
click to vote
OOPSLA
1997
Springer
114
views
Security Privacy
»
more
OOPSLA 1997
»
Adding Type Parameterization to the Java Language
15 years 8 months ago
Download
www.cs.williams.edu
Ole Agesen, Stephen N. Freund, John C. Mitchell
claim paper
Read More »
« Prev
« First
page 115 / 1024
Last »
Next »