Active
Recent
Comments
Search
Login
Login
researchgate.net: 32 stories from 13 submitters
5
The φ accrual failure detector
☶
pdf
compsci
distributed
researchgate.net
via
epilys
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Temporal System Call Specialization for Attack Surface Reduction
pdf
security
researchgate.net
via
fro
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
Can your AI differentiate cats from CoViD-19?
ai
science
researchgate.net
via
goodger
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
XLBlocks: a Block-based Formula Editor for Spreadsheet Formulas
pdf
education
researchgate.net
via
fcbsd
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Hierarchical Hexagonal Clustering and Indexing
pdf
compsci
researchgate.net
via
pushcx
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Can WhatsApp Counter Misinformation by Limiting Message Forwarding?
pdf
security
researchgate.net
via
fcbsd
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
The Eclipse Operating System: Providing Quality of Service via Reservation Domains
pdf
osdev
researchgate.net
via
animatronic
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Race to Idle: New Algorithms for Speed Scaling with a Sleep State (2012)
pdf
hardware
osdev
performance
researchgate.net
via
inactive-user
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Static Analysis of ROP Code
pdf
security
windows
researchgate.net
via
fro
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Securing a Community Cloud (2010)
☶
pdf
linux
security
virtualization
researchgate.net
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
Flat Design vs Traditional Design: Comparative Experimental Study
cogsci
design
performance
researchgate.net
via
friendlysock
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
The ROP Needle: Hiding Trigger-based Injection Vectors via Code Reuse
pdf
security
researchgate.net
via
fro
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
An Efficient Coverage-driven Functional Verification System via Genetic Algorithms (2012)
☶
pdf
ai
programming
testing
researchgate.net
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Towards Verification of the Pastry Protocol using TLA+ (2011)
☶
pdf
distributed
formalmethods
programming
researchgate.net
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Formal Verification of Analog Circuit Parameters across Variation Utilizing SAT (2013)
☶
pdf
formalmethods
hardware
researchgate.net
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Virtualization Extensions into a Microkernel based Operating System
pdf
osdev
virtualization
researchgate.net
via
inactive-user
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Formally Verified On-Line Diagnosis (1999)
☶
pdf
compsci
distributed
researchgate.net
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Binary Heaps Formally Verified in Why3 (2011)
☶
formalmethods
programming
researchgate.net
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Design and performance analysis of web caching with integrated file system on FPGA
☶
pdf
hardware
programming
web
researchgate.net
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
4
It’s Doomed; We Can Prove It (2009)
☶
c
dotnet
formalmethods
researchgate.net
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Is Difficulty Overrated? Choice, Novelty and Suspense in Educational Games
pdf
education
games
researchgate.net
via
asthasr
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
K Semantics for Assembly Languages: A Case Study (2014)
☶
assembly
formalmethods
researchgate.net
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
Mythical Unit Test Coverage
pdf
practices
researchgate.net
via
friendlysock
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
5
Design-by-Contract for Specification and Conformance Testing of Distributed Software (2014)
☶
pdf
distributed
formalmethods
testing
researchgate.net
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
Social processes, program verification and all that (2009)
☶
pdf
formalmethods
philosophy
researchgate.net
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
Page 2 >>