Search Constraints
« Previous |
1 - 20 of 48
|
Next »
Search Results
Select an image to start the slideshow
Evaluating SGX’s Remote Attestation Security Through the Analysis of Copland Phrases
1 of 20
A Formalization of Strand Spaces in Coq
2 of 20
Environment Cockpit
3 of 20
Scenarios for Description Logic
4 of 20
A Tactic For Setoid Congruence
5 of 20
Model checking for role-based access control
6 of 20
A Natural Language Interface Using First Order Logic
7 of 20
Trusted Execution Environments with Architectural Support: Foundations and Implementation
8 of 20
Normalization for metadata
9 of 20
Theory Assistant 2
10 of 20
Live score synchronization II
11 of 20
X2S
12 of 20
Environment Cockpit
13 of 20
Interactive Model Finding with Hominy
14 of 20
Risk Reporting Techniques
15 of 20
Modeling and Analyzing Security Requirements for Java
16 of 20
BNP Paribas: Enterprise Architecture
17 of 20
BNP Paribas: Systems Analysis and Concept Development
18 of 20
Wall Street Project
19 of 20
Translating Alloy to SMT-LIB
20 of 20