.ac

Results: 359273



#Item
261Markov processes / Probability theory / Probability / Dynamic programming / Markov decision process / Stochastic control / Reinforcement learning / Memorylessness

MultiGain: A controller synthesis tool for MDPs with multiple mean-payoff objectives Tom´ aˇs Br´ azdil1, Krishnendu Chatterjee2 , Vojtˇech Forejt3 , and Anton´ın Kuˇcera1 1

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2015-02-02 16:39:01
262Process calculi / Theoretical computer science / -calculus / Expected value / Mathematics / Creativity / Abstraction

Code-Carrying Authorization Sergio Maffeis2,3 , Mart´ın Abadi1,2 , C´edric Fournet1 , and Andrew D. Gordon1 1 2

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
263Mathematics / Geometry / Mathematical analysis / Topology / Convex analysis / Measure theory / Order theory / Cover / General topology / Convex function / Support / Interval

Space-time Interpolants Goran Frehse1 , Mirco Giacobbe2 , and Thomas A. Henzinger2 1 Univ. Grenoble Alpes, CNRS, Grenoble INP, VERIMAG 2

Add to Reading List

Source URL: repository.ist.ac.at

Language: English - Date: 2018-04-16 08:14:19
264Computer network security / Cyberwarfare / Computing / Computer security / Web applications / Software testing / OWASP / Application security / Web application security / Automated threat / Vulnerability / Denial-of-service attack

............................................................... .............................................................. ............................................................... .............................

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2018-03-09 06:39:52
265ACPM

AC P M | AC A R R eBLAST The ACPM eBlast Program is a service that allows you to deliver a customized electronic message to thousands of industry professionals across the country. Our database includes plan sponsors, ad

Add to Reading List

Source URL: www.acpm.com

Language: English - Date: 2018-03-08 15:58:49
    266

    Hiding in the Crowd: an Analysis of the E�ectiveness of Browser Fingerprinting at Large Scale Alejandro Gómez-Boix Univ Rennes, Inria, CNRS, IRISA Rennes, France

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2018-03-06 09:06:09
      267Cryptography / Post-quantum cryptography / Lattice-based cryptography / Ring learning with errors / Learning with errors / Obfuscation / Lattice

      Obfuscating Conjunctions under Entropic Ring LWE∗ Zvika Brakerski† Weizmann Vinod Vaikuntanathan‡ MIT

      Add to Reading List

      Source URL: www.wisdom.weizmann.ac.il

      Language: English - Date: 2016-10-15 03:11:16
      268

      Concolic Testing for Deep Neural Networks

      Add to Reading List

      Source URL: qav.comlab.ox.ac.uk

      Language: English - Date: 2018-08-02 04:45:47
        269Model checkers / Application software / PRISM model checker / Systems science / Mathematics / Model checking / Uppaal Model Checker / Probabilistic automaton / PAT / Hybrid system / Markov chain

        PRISM 4.0: Verification of Probabilistic Real-time Systems Marta Kwiatkowska1 , Gethin Norman2 , and David Parker1 1 Department of Computer Science, University of Oxford, Oxford, OX1 3QD, UK

        Add to Reading List

        Source URL: qav.comlab.ox.ac.uk

        Language: English - Date: 2011-06-07 19:21:25
        270Logic / Mathematical logic / Mathematics / Predicate logic / Classical logic / Proof theory / Constructivism / Semantics / Propositional calculus / First-order logic / Intuitionistic logic / Well-formed formula

        PDF Document

        Add to Reading List

        Source URL: www.cl.cam.ac.uk

        Language: English - Date: 2018-08-15 07:19:29
        UPDATE