37 Signals. “Aggressive, spiky button vs. rounded corner button,” Signal vs. Noise, April 5, 2010,
https://37signals.com/svn/posts/2255-aggressive-spiky-button-vs-rounded-corner-button. Abi-Antoun, Marwan, and Jonathan Aldrich. “Static Extraction and Conformance Analysis of Hierarchical Runtime Architectural Structure Using Annotations.” In ACM SIGPLAN Notices, vol.
44, no. 10, pp. 321–40 (ACM, 2009). Abi-Antoun, Marwan, and Jeffrey M. Barnes. “Analyzing Security Architectures,” Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pp. 3–12 (ACM, 2010).
Acquisti, Alessandro, Ralph Gross, and Fred Stutzman. “Faces of Facebook: Or, How the Largest Real ID Database in the World Came to Be.” BlackHat USA, August, 2011. Draft available online at
http://www.heinz.cmu.edu/˜acquisti/face-recognition-study-FAQ/acquisti-faces-BLACKHAT-draft.pdf. Adams, A. A., and S. A. Williams, “What's Yours Is Mine and What's Mine's My Own,” unpublished draft, May 8, 2012,
http://opendepot.org/id/eprint/1096. Adams, Scott, Dilbert cartoon, published November 13, 1995,
http://thedilbertstore.com/comic_strips/1995/11/13. Adida, Ben, et al. “CALEA II: Risks of Wiretap Modifications to Endpoints,” Center for Democracy and Technology, May 17 2013,
https://www.cdt.org/files/pdfs/CALEAII-techreport.pdf. Adler, Andy. “Images Can Be Regenerated from Quantized Biometric Match Score Data,” Electrical and Computer Engineering, Canadian Conference on, vol. 1, pp. 469–72 ...
With Safari, you learn the way you learn best. Get unlimited access to videos, live online training,
learning paths, books, interactive tutorials, and more.