As

Results: 435832



#Item
171Internal audit / Accounting / Auditing / Business / Risk management / Internal control / Audit / Control environment / Model Audit Rule 205 / Fraud deterrence

Department of Human Resource Management Internal Control Questionnaire Review Results as of June 2018

Add to Reading List

Source URL: www.apa.virginia.gov

Language: English - Date: 2018-10-22 09:03:37
172Geographic data and information / Aditya Akella / OMB Circular A-16 / USENIX / Seshan / Computing / Information

Message from the NSDI ’18 Program Co-Chairs Welcome to NSDI ’18! Over the years, NSDI has established itself as the top venue for work on networked and distributed systems. This year’s iteration is no exception, an

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2018-03-08 20:36:01
173Contract law / Law / Economy / Private law / Prosper Marketplace / Terms of service / Indemnity / Session / Internet privacy / Prosper / Trademark / Lease

Terms of Use Last Updated: May 14, 2018 Hello Prosper Inc. operating as “Hello Prosper” (“Prosper”, “we”, or “us”) provides a service which, amongst other things, allows you as a user (a “user” or “

Add to Reading List

Source URL: helloprosper.com

Language: English - Date: 2018-05-18 14:40:03
174Artificial neural networks / Computational neuroscience / Machine learning / Artificial intelligence / Applied mathematics / Computational linguistics / Natural language processing / Speech recognition / Convolutional neural network / Language model / Long short-term memory / Neural network

Published as a conference paper at ICLRP ROGRAM S YNTHESIS FOR C HARACTER L EVEL L ANGUAGE M ODELING Pavol Bielik, Veselin Raychev & Martin Vechev Department of Computer Science, ETH Z¨urich, Switzerland

Add to Reading List

Source URL: files.sri.inf.ethz.ch

Language: English - Date: 2018-09-05 10:55:59
175Cryptocurrencies / Computing / Economy / Money / Blockchain / Bitcoin / Ethereum / Proof-of-stake / Hyperledger / Cryptoeconomics / Peercoin / Smart contract

Consensus-as-a-service: a brief report on the emergence of permissioned, distributed ledger systems By Tim Swanson Published: April 6,

Add to Reading List

Source URL: www.ofnumbers.com

Language: English - Date: 2015-04-06 15:25:09
176Mathematics / Differential equations / Calculus / Abstraction / Partial differential equation / Ordinary differential equation / Equation / Artificial neural network / Linear differential equation / Numerical methods for ordinary differential equations

Towards Solving Differential Equations through Neural Programming Forough Arabshahi 1 Sameer Singh 1 Animashree Anandkumar 2 1. Introduction Differential equations are used to model numerous phenomena such as heat, elec

Add to Reading List

Source URL: uclmr.github.io

Language: English - Date: 2018-08-06 06:17:49
177Machine learning / Artificial intelligence / Learning / Statistical randomness / Q-learning / Metalearning / Reinforcement learning / Artificial neural network / Meta learning / Multi-armed bandit / Markov decision process / Feature learning

Under review as a conference paper at ICLRM ETA L EARNING S HARED H IERARCHIES Jonathan Ho, Xi Chen, Pieter Abbeel UC Berkeley, Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2017-10-26 20:31:00
178Economy / Business / Technology / ETH Domain / cole Polytechnique Fdrale de Lausanne / Swisscom / VentureLab / Startup company

PRESS RELEASE For immediate release EDTECH STARTUPS RECEIVE A TOTAL OF CHF 180’000 DIRECT CASH INCLUDING PRIZES OF CHF 100’000 AS KICKSTART ACCELERATOR EDTECH PROGRAM IN LAUSANNE CLOSES

Add to Reading List

Source URL: ksacc.panter.ch

Language: English - Date: 2018-01-11 12:24:32
179Constraint programming / NP-complete problems / Puzzles / Crossword / Constraint satisfaction / Local consistency / Human behavior / Backtracking / Theoretical computer science / Cognition

Crossword Puzzles as a Constraint Problem Anbulagan and Adi Botea NICTA?? and Australian National University, Canberra, Australia {anbulagan|adi.botea}@nicta.com.au Abstract. We present new results in crossword composit

Add to Reading List

Source URL: abotea.rsise.anu.edu.au

Language: English - Date: 2008-06-30 05:38:49
180Cybercrime / Cyberwarfare / Computer security / Security / National security / Cyberattacks / Cyberterrorism / Internet privacy / Social networking service / Stuxnet / Risk / Strategic management

Blind in the Panopticon The decreasing marginal utility of access to information as an aspect of cyber policy The uncertain price of information There is no clear way, in the present, of deciding what information will be

Add to Reading List

Source URL: files.howtolivewiki.com

Language: English - Date: 2014-04-16 01:17:19
UPDATE