Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Agat (computer)

Known as: Agat, Agat computer 
The Agat (Russian: Агат) was a series of 8-bit computers produced in the Soviet Union. Though considered a clone of the Apple II with some… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Penelitian ini bertujuan untuk membuat sebuah rancangan pengembangan (blueprint) dalam pembuatan instrumen pembelajaran berbasis… Expand
Highly Cited
2016
Highly Cited
2016
Information flow analyses traditionally use the Program Dependence Graph (PDG) as a supporting data-structure. This graph relies… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
2010
2010
We develop a new notion of security against timing attacks where the attacker is able to simultaneously observe the execution… Expand
  • table 1
  • figure 1
  • table 2
  • table 4
  • figure 2
2009
2009
This paper, using data from the 2006 Irish Census, provides evidence of the structural advantage of Irish speaking, relative to… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
2006
2006
With the variables of a program classified as L (low, public) or H (high, private), the secure information flow problem is… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 6
  • figure 7
Highly Cited
2004
Highly Cited
2004
Palaeoenvironmental investigations not only provide information about past climate, geomorphological changes, and vegetation, but… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 5
Highly Cited
2003
Highly Cited
2003
  • Geoffrey Smith
  • 16th IEEE Computer Security Foundations Workshop…
  • 2003
  • Corpus ID: 10227822
To be practical, systems for ensuring secure information flow must be as permissive as possible. To this end, the author recently… Expand
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2001
Highly Cited
2001
  • Geoffrey Smith
  • Proceedings. 14th IEEE Computer Security…
  • 2001
  • Corpus ID: 911268
Abstract: With the variables of a program classified as L (low, public) or H (high, private), we wish to prevent the program from… Expand
  • figure 1
  • figure 2
  • figure 3
1991
1991
  • H. Madala
  • Complex Syst.
  • 1991
  • Corpus ID: 15010682
Abstr act. This paper st udies differences and similarit ies among inductive GMDH, deductive adaline, and back prop agat ion… Expand
  • figure 3
  • table 1
  • table 1
  • table 1
Review
1978
Review
1978
Abstract : The cultural remains observed in the Gaan Point area either recent or poorly preserved, and of undetermined age. No… Expand