Γ
All
Videos π¬
Audios π΅
eBooks π
Mobile Apps π±
Archives (ZIP/ISO) πΏ
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
The Adaptive Radix Tree: ARTful Indexing for Main-Memory Databases (2004) - Leis et. al.pdf.gz
Home
/
Discover
/
www.kgay4all.com
/
Books
/
library--
/
computer science theory
/
Parent Folder
The Adaptive Radix Tree: ARTful Indexing for Main-Memory Databases (2004) - Leis et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
The Rogue Genius Micro-Tasking System.pdf.gz
GZ
2 years ago
309.70 kB
Copy Link
The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet (2005) - Beverly, Bauer.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Software Architecture Patterns (2015) - Richards.pdf.gz
GZ
2 years ago
106 bytes
Copy Link
Shadow Walker: Raising The Bar For Rootkit Detection (2006) - Sparks, Butler.pdf.gz
GZ
2 years ago
Get Size
Copy Link
The X-Tree: An Index Structure for High-Dimensional Data (1996) - Berchtold et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
This POODLE Bites: Exploiting the SSL 3.0 Fallback (2014) - MoΜller, Duong, Kotowicz.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Russian Peasant Multiplication Algorithm, RSA Cryptosystem, and a New Explanation of Half-Orders of Magnitude (2007) - Vargas, Kosheleva.pdf.gz
GZ
2 years ago
556 bytes
Copy Link
Radio Frequency Identification: Security and Privacy Issues: 6th International Workshop Selected Papers (2010).pdf.gz
GZ
2 years ago
Get Size
Copy Link
Optimal Algorithms for Byzantine Agreement (1983) - Feldman.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Touch'n'Trust: An NFC-enabled Trusted Platform Module (2011) - Hutter, Toegl.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Turkit: human computation algorithms on mechanical turk (2010) - Little, Chilton, Goldman, Miller.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Optical Time-Domain Eavesdropping Risks of CRT Displays (2002) - Kuhn.pdf.gz
GZ
2 years ago
Get Size
Copy Link
OpenDTex: Linux Secure Boot (2014) [31c3] - GuiheΜry.pdf.gz
GZ
2 years ago
184.36 kB
Copy Link
Using Trusted Execution Environments in Two-Factor Authentication: comparing approaches (2014) - Rijswijk-Deij, Poll.pdf.gz
GZ
2 years ago
Get Size
Copy Link
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities (2016) - Torres-Arias, Ammula, Curtmola, Cappos.pdf.gz
GZ
2 years ago
Get Size
Copy Link
We Can Hear You with WiFi! (2015) - Wang et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Off-Path TCP Exploits: Global Rate Limit Considered Dangerous (2016) - Cao et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
What's the Difference?: Efficient Set Reconciliation without Prior Context (2011) - Eppstein, Goodrich, et. al.pdf.gz
GZ
2 years ago
Get Size
Copy Link
MinimaLT: Minimal-latency Networking Through Better Security (2013) - Petullo, Zhang, Solworth, Bernstein, Lange.pdf.gz
GZ
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.