Computer

Results: 301026



#Item
91Formal languages / Mathematics / Theoretical computer science / Models of computation / Discrete mathematics / Nested word / Words / Bisimulation / Distribution / Deterministic pushdown automaton

Bisimilarity of Probabilistic Pushdown Automata Vojtěch Forejt1 , Petr Jančar2 , Stefan Kiefer1 , and James Worrell1 1 2 Department of Computer Science, University of Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2013-12-01 10:21:43
92Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-07-09 00:19:47
93Computing / Data management / Data / Business intelligence / Database management systems / Technology forecasting / Transaction processing / Dan Suciu / Big data / Probabilistic database / Data science / Analytics

University of Washington Database Group Quarterly Newsletter - FallUW Database Group Data management systems, cloud services, probabilistic databases, and data pricing in Computer Science & Engineering at the Univ

Add to Reading List

Source URL: db.cs.washington.edu

Language: English - Date: 2018-10-11 15:27:57
94Computer network security / Computing / Firewall software / Information and communications technology / Computer security / Data security / Internet censorship in China / Human rights in China / Firewall / Stateful firewall / Internet censorship / Router

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2011-03-10 12:58:06
95Mathematical analysis / Mathematics / Abstract interpretation / Function / Exponential function / Complex analysis / Formal methods / Centripetal CatmullRom spline

Bounds Analysis by Abstract Interpretation Xiaolei Qian Computer Science Laboratory SRI International

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-08 19:03:01
96Computer science / Computing / Electrical engineering / Symposium on Principles of Programming Languages / Programming Language Design and Implementation / Association for Computing Machinery / Vienna Summer of Logic / Theoretical computer science / ACM SIGACT / Helmut Veith / International Colloquium on Automata /  Languages and Programming / International Conference on Functional Programming

Madhusudan Parthasarathy Curriculum Vitae Department of Computer Science Univ. of Illinois at Urbana-Champaign

Add to Reading List

Source URL: madhu.cs.illinois.edu

Language: English - Date: 2018-01-11 14:37:00
97

Darko Marinov Professor Department of Computer Science University of Illinois at Urbana-Champaign http://mir.cs.illinois.edu/marinov

Add to Reading List

Source URL: mir.cs.illinois.edu

Language: English - Date: 2017-12-20 20:53:41
    98Statistical natural language processing / World Wide Web / Digital media / Internet culture / Subreddits / Crowdsourcing / Reddit / Collaboration / /r/IAmA / Oriented FAST and rotated BRIEF / Topic model / Select

    Learning Linguistic Descriptors of User Roles in Online Communities Alex Wang1 , William L. Hamilton2 , Jure Leskovec2 1 School of Engineering and Applied Sciences, Harvard University, Cambridge MA, Computer Scie

    Add to Reading List

    Source URL: www.aclweb.org

    Language: English - Date: 2016-10-27 12:19:11
    99Course / Curricula

    Computer Science_BS_Information Systems.pdf

    Add to Reading List

    Source URL: catalog.southernct.edu

    Language: English - Date: 2018-10-06 18:04:21
    100Computing / Software engineering / Computer security / Hacking / Cross-site scripting / Cross-site request forgery / Security / JavaScript / SQL injection / HTTP cookie / Code injection / World Wide Web

    EECS 388 Intro to Computer Security September 30, 2016 Project 2: Web Security

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2016-11-21 18:50:22
    UPDATE