1 2

Results: 258872



#Item
71Learning / Education / Human behavior / Educational psychology / Educational practices / Philosophy of education / Curricula / Bayesian network / Active learning / Question / Bayesian inference / Machine learning

Asking and evaluating natural language questions Anselm Rothe1 , Brenden M. Lake2 , and Todd M. Gureckis1 1 Department of Psychology, 2 Center for Data Science, New York University

Add to Reading List

Source URL: cims.nyu.edu

Language: English - Date: 2016-05-13 20:53:50
72

1 2 Ville de la Rochelle

Add to Reading List

Source URL: www.larochelle.fr

Language: French - Date: 2017-07-25 03:27:31
    73Artificial neural networks / Machine learning / Applied mathematics / Mathematics / Artificial intelligence / Topological graph theory / Market research / Feature learning / Deep learning / Graph embedding / Word embedding

    This Talk § 1) Node embeddings § Map nodes to low-dimensional embeddings. § 2) Graph neural networks

    Add to Reading List

    Source URL: snap.stanford.edu

    Language: English - Date: 2018-04-25 02:50:04
    74Cryptocurrencies / Economy / Money / Alternative currencies / Finance / Payment systems / Financial technology / Decentralization / Digital currency / Blockchain / Bitcoin / Ethereum

    Obirum WHITEPAPER Version 2.1.1 Obirum White paper is a living document.

    Add to Reading List

    Source URL: icorating.com

    Language: English
    75

    Influence of first two keystream bytes 2−7 Bias 1 Bias 3 Bias 5

    Add to Reading List

    Source URL: www.rc4nomore.com

    - Date: 2018-09-24 16:02:05
      76Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

      StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

      Add to Reading List

      Source URL: censorbib.nymity.ch

      Language: English - Date: 2014-05-19 10:30:48
      77Computer programming / Computing / Software engineering / Source code / JetBrains MPS / Language workbench / Domain-specific language / Programming language / JetBrains / Structure editor / Macro / Software development

      Projecting a Modular Future Markus Voelter1 , Jos Warmer2 , and Bernd Kolb3 1 2

      Add to Reading List

      Source URL: mbeddr.com

      Language: English - Date: 2018-08-02 04:06:51
      78Formal languages / Mathematics / Theoretical computer science / Models of computation / Discrete mathematics / Nested word / Words / Bisimulation / Distribution / Deterministic pushdown automaton

      Bisimilarity of Probabilistic Pushdown Automata Vojtěch Forejt1 , Petr Jančar2 , Stefan Kiefer1 , and James Worrell1 1 2 Department of Computer Science, University of Oxford, UK

      Add to Reading List

      Source URL: qav.comlab.ox.ac.uk

      Language: English - Date: 2013-12-01 10:21:43
      79Cryptography / Public-key cryptography / Post-quantum cryptography / Hash-based cryptography / Hashing / Merkle signature scheme / Digital signature / Cryptographic hash function / Merkle tree / RSA / Hash function / Quantum digital signature

      Practical Fault Injection Attacks on SPHINCS Aymeric Genêt1,2 , Matthias J. Kannwischer3 , Hervé Pelletier2 , and Andrew McLauchlan2 ? 1 EPFL, Lausanne, Switzerland

      Add to Reading List

      Source URL: kannwischer.eu

      Language: English - Date: 2018-10-15 10:31:49
      80Economy / Telecommunications service provider / Premium-rate telephone number / Business / Service provider / Tariff / Traffic Service Position System

      Table of Contents 1. Legal basis .............................................................................................................................3 2.

      Add to Reading List

      Source URL: asut.ch

      Language: English - Date: 2015-08-17 11:06:42
      UPDATE