Biblio

Export 216 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Acquisti A, Dingledine R, Syverson P. On the Economics of Anonymity. In: Financial Cryptography. Springer-Verlag, LNCS 2742. Financial Cryptography. Springer-Verlag, LNCS 2742. ; 2003. pp. 84–102. econymics.pdf (208.91 KB)
Adams P. The End Of Apps As We Know Them. [Internet]. 2014 ;2014. Available from: http://blog.intercom.io/the-end-of-apps-as-we-know-them/
Adar E, Huberman BA. Free Riding on Gnutella. 2000 . freeriding-gnutella.pdf (192.18 KB)
Albert R, Jeong H, Barabási A-L. The Internet's Achilles' Heel: Error and attack tolerance of complex networks. Nature. 2000 ;406:200–0.
Allspaw J. Anticipation: What Could Possibly Go Wrong?. Velocity Europe 2011 [Internet]. 2011 . Available from: http://www.youtube.com/watch?v=gy2lTFD4560&noredirect=1
Allspaw J. Resilient Response in Complex Systems. QCon 2012 [Internet]. 2012 . Available from: http://www.infoq.com/presentations/Resilient-Response-In-Complex-Systems
Allspaw J. Resilience Engineering Part II: Lenses. [Internet]. 2012 ;2013. Available from: http://www.kitchensoap.com/2012/06/18/resilience-engineering-part-ii-lenses/
Allspaw J. Resilience Engineering: Part I. [Internet]. 2011 ;2013. Available from: http://www.kitchensoap.com/2011/04/07/resilience-engineering-part-i/
Alon U. How to choose a good scientific problem. Molecular Cell [Internet]. 2009 ;35:726–728. Available from: http://www.ncbi.nlm.nih.gov/pubmed/19782018 choosecientificproblem.pdf (227.65 KB)
Alves CA. Kurso de Esperanto. [Internet]. 2009 . Available from: http://www.kurso.com.br/
Amann B, Fuhrmann T. Cryptographically Enforced Permissions for Fully Decentralized File Systems. In: Peer-to-Peer Computing. Peer-to-Peer Computing. ; 2010. pp. 1-10. amann10cryptographically.pdf (541.12 KB)
Anderson RJ. The Eternity Service. [Internet]. 1997 . Available from: http://www.cl.cam.ac.uk/~rja14/eternity/eternity.html
Anderson TE, Dahlin MD, Neefe JM, Patterson DA, Roselli DS, Wang RY. Serverless network file systems. ACM Trans. Comput. Syst. [Internet]. 1996 ;14:41–79. Available from: http://doi.acm.org/10.1145/225535.225537
Araya CH. La dimensión jurídica del software: naturaleza, tutela, jurídica, contratos y responsabilidad. Editorial Investigaciones Jurídicas; 2004. Available from: http://books.google.com/books?id=-QkTKQEACAAJ
Artigas MS. Distributed Access Enforcement in P2P Networks: When Privacy Comes into Play. In: Peer-to-Peer Computing. Peer-to-Peer Computing. ; 2010. pp. 1-10.
Asher J. "Power Nap" Prevents Burnout; Morning Sleep Perfects a Skill. [Internet]. 2002 ;2013. Available from: http://www.nih.gov/news/pr/jul2002/nimh-02.htm
Aslett M. The decline of ‘open source’ as an identifying differentiator. [Internet]. 2011 ;2011. Available from: http://blogs.the451group.com/opensource/2011/06/27/the-decline-of-open-source-as-an-identifying-differentiator/
Axelrod R, Hamilton WD. The Evolution of Cooperation. 1981 . axelrod.pdf (36.04 KB)
B
Back A, Möller U, Stiglic A. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Proceedings of the 4th International Workshop on Information Hiding. Proceedings of the 4th International Workshop on Information Hiding. London, UK, UK: Springer-Verlag; 2001. pp. 245–257. Available from: http://dl.acm.org/citation.cfm?id=647597.731866 traffic.pdf (54.12 KB)
Bainbridge L. Ironies of automation. Automatica [Internet]. 1983 ;19:775–779. Available from: http://www.bainbrdg.demon.co.uk/Papers/Ironies.html
Beck K. Test-driven development: by example. Addison-Wesley; 2003. Available from: http://books.google.com/books?id=gFgnde\_vwMAC
Bernhardt G. Boundaries. PyCon US 2013 [Internet]. 2013 . Available from: http://pyvideo.org/video/1670/boundaries
Berthold O, Pfitzmann A, Standtke R. The Disadvantages of Free MIX Routes and How to Overcome Them. In: INTERNATIONAL WORKSHOP ON DESIGNING PRIVACY ENHANCING TECHNOLOGIES: DESIGN ISSUES IN ANONYMITY AND UNOBSERVABILITY. INTERNATIONAL WORKSHOP ON DESIGNING PRIVACY ENHANCING TECHNOLOGIES: DESIGN ISSUES IN ANONYMITY AND UNOBSERVABILITY. Springer-Verlag New York, Inc.; 2001. pp. 30–45.
Berthold O, Köhntopp M. Identity management based on P3P. In: International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability. International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability. New York, NY, USA: Springer-Verlag New York, Inc.; 2001. pp. 141–160. Available from: http://portal.acm.org/citation.cfm?id=371931.371987
Berthold O, Federrath H, Köpsell S. Web MIXes: A system for anonymous and unobservable Internet access. In: INTERNATIONAL WORKSHOP ON DESIGNING PRIVACY ENHANCING TECHNOLOGIES: DESIGN ISSUES IN ANONYMITY AND UNOBSERVABILITY. INTERNATIONAL WORKSHOP ON DESIGNING PRIVACY ENHANCING TECHNOLOGIES: DESIGN ISSUES IN ANONYMITY AND UNOBSERVABILITY. Springer-Verlag New York, Inc.; 2001. pp. 115–129.

Pages