Information Science

Results: 101298



#Item
411

Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption Yusuke Kawamoto1 Hideki Sakurada2 Masami Hagiya1 1 Department of Computer Science, Graduate School of Information Science and Technology,

Add to Reading List

Source URL: www.cs.bham.ac.uk

- Date: 2013-08-01 12:14:39
    412

    Finding API manufacturing information for a molecule

    Add to Reading List

    Source URL: ip-science.thomsonreuters.com.cn

    - Date: 2013-05-03 02:23:32
      413

      Computer Science Specialisations: internet networks, systems and computer networks, network and information technology security Degree obtained: Bachelor, Duration: 7 semesters (3,5 years) Selected subjects for

      Add to Reading List

      Source URL: www.pwsz.nysa.pl

      - Date: 2012-10-25 03:13:09
        414

        INTERSPEECHComparative Study of Speaker Personality Traits Recognition in Conversational and Broadcast News Speech Firoj Alam, Giuseppe Riccardi Department of Information Engineering and Computer Science, Universi

        Add to Reading List

        Source URL: dl.dropboxusercontent.com

          415

          Zubin Jelveh Contact Information Department of Computer Science and Engineering New York University Polytechnic School of Engineering

          Add to Reading List

          Source URL: 18798-presscdn-pagely.netdna-ssl.com

          - Date: 2016-08-14 03:21:00
            416

            On Feature Protection in C++, Java and Eiffel Markku Sakkinen University of Jyvaskyla ∗ , Department of Computer Science and Information Systems P.O. Box 35, FIUniversity of Jyvaskyla, Finland markku.j.sakkinen@

            Add to Reading List

            Source URL: users.jyu.fi

            - Date: 2015-06-24 02:57:35
              417

              A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

              Add to Reading List

              Source URL: www.cs.bham.ac.uk

              - Date: 2013-08-01 12:14:38
                418

                Exponential Family Harmoniums with an Application to Information Retrieval Max Welling & Michal Rosen-Zvi Information and Computer Science University of California

                Add to Reading List

                Source URL: www.cs.toronto.edu

                - Date: 2005-01-01 16:44:31
                  419

                  THE NON-BAYESIAN RESTLESS MULTI-ARMED BANDIT: A CASE OF NEAR-LOGARITHMIC REGRET Wenhan Dai†∗ , Yi Gai‡ , Bhaskar Krishnamachari‡ , Qing Zhao§ † School of Information Science and Technology, Tsinghua Universit

                  Add to Reading List

                  Source URL: www-scf.usc.edu

                  - Date: 2011-02-13 17:38:25
                    420

                    Interaction Evaluation for Human-Computer Co-creativity: A Case Study Anna Kantosalo, Jukka M. Toivanen, Hannu Toivonen Department of Computer Science and Helsinki Institute for Information Technology HIIT University of

                    Add to Reading List

                    Source URL: computationalcreativity.net

                    - Date: 2015-10-27 08:25:15
                      UPDATE