Mobile platforms operate under fundamentally different trust assumptions than we relied on for web security. Your mobile ...
Abstract: This paper considers the basic question of how strong of a probabilistic guarantee can a hash table, storing $n(1+\Theta(1))\log n$-bit key/value pairs ...
Security firm Mandiant has released a database that allows any administrative password protected by Microsoft’s NTLM.v1 hash algorithm to be hacked in an attempt to nudge users who continue using the ...
Tables have always been more than just furniture as they are where conversations unfold, ideas take shape, and everyday rituals quietly happen. This year, designers pushed this humble object far ...
At its core, a continuous function is one that can be drawn without lifting your pen from the paper. More formally, a function f(x) is continuous at a point x = a if it satisfies three conditions: If ...
second edition of this book differs from the first in many respects. The number of pages has been increased from 188 to 348, and the explanatory matter is now in both German and English. There are now ...
There’s a lot going on with a coffee table. It needs to hold your cup of coffee (preferably in style), along with books, cords, and a lamp. It needs to stack magazines and endear itself to your guests ...
Abstract: Control flow is the execution order of individual statements, instructions, or function calls within an imperative program. Malicious operation of control flow (e.g., tampering with normal ...
IIIF provides researchers rich metadata and media viewing options for comparison of works across cultural heritage collections. Visit the IIIF page to learn more. In the mid-twentieth century, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results