Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
How to Build an Introductory Linux Cluster for Parallel Computing (2003) - He, Ni.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
computer science theory
/
Parent Folder
How to Build an Introductory Linux Cluster for Parallel Computing (2003) - He, Ni.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Gyrophone: Recognizing Speech From Gyroscope Signals (2014) - Michalevsky, Boneh, Nakibly.pdf.gz
GZ
2 years ago
Get Size
Copy Link
FlowSpec: BGP Policy-Based Routing [slides] (2011) - Gabut-Deloraine.pdf.gz
GZ
2 years ago
Get Size
Copy Link
IMSI-Catch Me If You Can: IMSI-Catcher-Catchers (2014) - Dabrowski, Pianta, Klepp, Mulazzani, Weippl.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Identifying and Characterizing Anycast in the Domain Name System (2011) - Fan, Heidemann, Govindan.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Fingerprinting Web Application Platforms by Variations in PNG Implementations (2015) - Bongard.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Few Electron Limit of n-type Metal Oxide Semiconductor Single Electron Transistors (2012) - Prati et. al.pdf
PDF
2 years ago
Get Size
Copy Link
Increased DNS Forgery Resistance Through 0x20-Bit Encoding: SecURItY viA LeET QueRieS (2008) - Dagon, Antonakakis, Vixie, Jinmei, Lee.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Equilibria of Chinese Auctions (2012) - BraΜnzei, Forero, Larson, Miltersen.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Intel Architecture Instruction Set Extensions Programming Reference (2015).pdf.gz
GZ
2 years ago
556 bytes
Copy Link
International Journal on Advances in Security, Vol. IV, 1-2 (2011) - IARIA.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Entropy Based Analysis of DNS Query Traffic in the Campus Network - RomanΜa, Musushi.pdf.gz
GZ
2 years ago
106 bytes
Copy Link
Efficient Turing-Universal Computation with DNA Polymers (2011) - Qian, Soloveichik, Winfree.pdf
PDF
2 years ago
Get Size
Copy Link
Invertible Bloom Lookup Tables (2011) - Goodrich, Mitzenmacher.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Distributed Estimation in Multi-Agent Networks (2012) - Sankar, Poor.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Is Brain Emulation Dangerous (2012) - Eckersley, Sandberg.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Characterization and Measurement of TCP Traversal through NATs and Firewalls (2005) - Guha, Francis.pdf.gz
GZ
2 years ago
Get Size
Copy Link
LT^2C^2: A language of thought with Turing-computable Kolmogorov Complexity (2013) - Romano, Sigman, Figueira.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Backdoors to Tractable Answer-Set Programming (2012) - Fichte, Szeider.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Measuring the Security Harm of TLS Crypto Shortcuts (2016) - Springall, Durumeric, Halderman.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.