.ac

Results: 359273



#Item
491Computing / Internet / Free software / Adversarial machine learning / Computer security / Machine learning / Privacy / Internet privacy / Deep learning / Tor

Jamie Hayes Contact Information University College London Dept. of Computer Science

Add to Reading List

Source URL: www.homepages.ucl.ac.uk

Language: English - Date: 2018-10-24 08:20:07
492Mathematical logic / Mathematics / Theoretical computer science / Lambda calculus / Deductive reasoning / Natural deduction / Proof theory / Symbol / System F / -calculus / Holomorphic functional calculus / Security type system

ITRS 2004 Preliminary Version Sequence Types for the π-calculus Sergio Maffeis 1 Department of Computing, Imperial College London,

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
493Ancient Greek technology / Automation / Automaton / Robotics / Formal methods / Programming paradigms

The Problem Our Approach Quantified Event Automata

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2016-07-20 07:27:30
494Computing / Cyberwarfare / Computer security / Computer network security / World Wide Web / Hacking / Transport Layer Security / Cryptographic protocols / Same-origin policy / Cross-site scripting / Browser security / Framing

Securing Frame Communication in Browsers Adam Barth Stanford University Collin Jackson

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2015-03-02 09:43:24
495

When the Cure is Worse than the Disease: the Impact of Graceful IGP Operations on BGP Laurent Vanbever† , Stefano Vissicchio† , Luca Cittadini∗ , and Olivier Bonaventure† † †

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English
    496Mathematical analysis / Probability theory / Statistical theory / Evolutionary developmental biology / Gene expression / Gene regulatory network / Networks / Systems biology / Linear temporal logic / Normal distribution / Model theory

    Model Checking Gene Regulatory Networks ? Mirco Giacobbe∗ , C˘alin C. Guet∗ , Ashutosh Gupta∗† , Thomas A. Henzinger∗ , Tiago Paix˜ao∗ , and Tatjana Petrov∗

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2018-05-10 06:54:26
    497Theoretical computer science / Formal languages / Logic in computer science / Runtime verification / Finite-state machine / Geographic information system / Regular expression / Software engineering / Computing

    A Pattern-Based Approach to Parametric Specification Mining Giles Reger , Howard Barringer, David Rydeheard University of Manchester Abstract—This paper presents a technique for using execution

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2016-07-20 12:50:25
    498Formal methods / Logic in computer science / Runtime verification / Marq / Monitoring / System programming / Computing / Computer science

    Runtime Monitoring Quantified Event Automata Efficient monitoring

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2016-07-20 13:14:17
    499Temporal logic / Linear temporal logic / Computation tree logic / Operator / Cone / Mathematics / Mathematical logic / Philosophy of science

    Reasoning about Cognitive Trust in Stochastic Multiagent Systems

    Add to Reading List

    Source URL: qav.comlab.ox.ac.uk

    Language: English - Date: 2016-12-12 09:16:41
    500Music / Applied mathematics / Cybernetics / Theoretical computer science / Mathematics / Genetic algorithms / Model checking / Simulated annealing / Control theory / Synthesizer / Crossover / Algorithm

    Synthesis of Protocols and Discrete Controllers Thesis submitted in accordance with the requirements of the University of Liverpool for the degree of Doctor in Philosophy by Idress Mohammed Husien

    Add to Reading List

    Source URL: cgi.csc.liv.ac.uk

    Language: English - Date: 2018-05-18 11:31:30
    UPDATE