Information Science

Results: 101298



#Item
371

Simple, Fast Noise-Contrastive Estimation for Large RNN Vocabularies Barret Zoph∗ , Ashish Vaswani∗, Jonathan May, and Kevin Knight Information Sciences Institute Department of Computer Science University of Southern

Add to Reading List

Source URL: www.isi.edu

- Date: 2016-04-04 11:52:38
    372

    Interactively Exploring a Machine Translation Model Steve DeNeefe, Kevin Knight, and Hayward H. Chan Information Sciences Institute and Department of Computer Science The Viterbi School of Engineering, University of Sout

    Add to Reading List

    Source URL: www.aclweb.org

    - Date: 2010-06-15 02:48:14
      373

      LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2⋆ , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      - Date: 2015-08-02 23:01:51
        374

        How to Memorize a Random 60-Bit String Marjan Ghazvininejad Information Sciences Institute Department of Computer Science University of Southern California

        Add to Reading List

        Source URL: www-scf.usc.edu

        - Date: 2015-10-24 21:36:47
          375

          Algorithmic Trading and Computational Finance Michael Kearns Computer and Information Science University of Pennsylvania STOC Tutorial

          Add to Reading List

          Source URL: www.cis.upenn.edu

          - Date: 2012-05-24 11:36:14
            376

            Side-channel Vulnerability Factor: A Metric for Measuring Information Leakage John Demme Robert Martin Adam Waksman Simha Sethumadhavan Computer Architecture Security and Technology Lab Department of Computer Science, Co

            Add to Reading List

            Source URL: www.cs.columbia.edu

            - Date: 2012-06-11 10:18:08
              377

              The Information Environment and Consistency in Citizens’ Policy Opinions August 19, 2014 Thomas J. Leeper and Rune Slothuus Department of Political Science and Government

              Add to Reading List

              Source URL: dl.dropboxusercontent.com

                378

                Learning Whom to Trust with MACE Dirk Hovy1 Taylor Berg-Kirkpatrick2 Ashish Vaswani1 Eduard Hovy3 (1) Information Sciences Institute, University of Southern California, Marina del Rey (2) Computer Science Division, Unive

                Add to Reading List

                Source URL: anthology.aclweb.org

                - Date: 2013-05-18 12:41:37
                  379

                  Sentential Paraphrasing as Black-Box Machine Translation Courtney Napoles1 , Chris Callison-Burch2 , and Matt Post3 Center for Language and Speech Processing, Johns Hopkins University 2 Computer and Information Science D

                  Add to Reading List

                  Source URL: cis.upenn.edu

                  - Date: 2016-09-12 16:40:29
                    380

                    Benchmarking for Graph Transformation∗ Gergely Varr´o1,2 , Andy Sch¨urr2 , D´aniel Varr´o3 , , 1 Department of Computer Science and Information The

                    Add to Reading List

                    Source URL: www.cs.bme.hu

                    - Date: 2005-02-18 08:07:11
                      UPDATE