Computer

Results: 301026



#Item
171Dynamic programming / Markov decision process / Stochastic control / Symbol / Timed automaton / Probability and statistics / Probability / Approximation algorithms / Computational complexity theory

Symbolic Verification and Strategy Synthesis for Linearly-Priced Probabilistic Timed Automata Marta Kwiatkowska1 , Gethin Norman2 , and David Parker3 1 Department of Computer Science, University of Oxford, Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2017-05-09 09:35:44
172

Building Power Consumption Models from Executable Timed I/O Automata Specifications ∗ Benoît Barbot , Marta Kwiatkowska, Alexandru Mereacre and Nicola Paoletti Department of Computer Science, University of Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2016-02-03 11:53:39
    173Computing / Concurrent computing / Cache coherency / Computer architecture / Transaction processing / Cache / Parallel computing / Concurrency control / CPU cache / MESI protocol / Cache coherence / Victim cache

    Characterization of TCC on Chip-Multiprocessors Austen McDonald, JaeWoong Chung, Hassan Chafi, Chi Cao Minh, Brian D. Carlstrom Lance Hammond, Christos Kozyrakis, Kunle Olukotun Computer Systems Laboratory Stanford Unive

    Add to Reading List

    Source URL: www.austenmcdonald.com

    Language: English - Date: 2016-01-26 12:43:51
    174Computability theory / Functions and mappings

    On The Impossibility Of Robust Solutions For Fair Resource Allocation Rajeev Joshi , Jayadev Misra Department of Computer Sciences, The University of Texas at Austin

    Add to Reading List

    Source URL: rjoshi.org

    Language: English - Date: 2010-09-11 18:26:03
    175Model checkers / Software engineering / Formal methods / Theoretical computer science / Software quality / Computing / PRISM model checker / Model checking / Formal verification / Markov chain / Stochastic / Reliability engineering

    Advances and Challenges of Quantitative Verification and Synthesis for Cyber-Physical Systems Marta Kwiatkowska Department of Computer Science, University of Oxford, UK Abstract—We are witnessing a huge growth of cyber

    Add to Reading List

    Source URL: qav.comlab.ox.ac.uk

    Language: English - Date: 2016-09-02 06:46:32
    176Mathematical software / Application software / Software / Theoretical computer science / Formal methods / Logic in computer science / Discrete mathematics / Verification / Quantifier elimination / Formal verification / Model checking / Computer science

    Ritwika Ghosh phone : (+email : Profile : I am a first year graduate student in Computer Science at the University of Illinois, Urbana-Champaign, interested in formal methods, and appl

    Add to Reading List

    Source URL: web.engr.illinois.edu

    Language: English - Date: 2014-02-28 12:52:15
    177

    die datenschleuder. das wissenschaftliche fachblatt für datenreisende ein organ des chaos computer club Biometrie zum Anfassen.

    Add to Reading List

    Source URL: ds.ccc.de

    Language: German - Date: 2006-03-09 18:28:05
      178Probability theory / Statistical randomness / Probability / Markov models / Graph theory / Stochastic game / Probabilistic automaton / Game theory / Markov chain / Determinacy / Strategy / Markov decision process

      Compositional Strategy Synthesis for Stochastic Games with Multiple Objectives N. Basseta , M. Kwiatkowskaa,⇤, C. Wiltschea a Department of Computer Science, University of Oxford, United Kingdom

      Add to Reading List

      Source URL: www.prismmodelchecker.org

      Language: English - Date: 2017-06-28 16:10:52
      179Machine learning / Learning / Artificial intelligence / Applied mathematics / Artificial neural network / Outline of machine learning / Supervised learning / Regularization / Empirical risk minimization / Backpropagation / Poisson regression / Parametric model

      Mathematics of Machine Learning: An introduction Sanjeev Arora Princeton University Computer Science Institute for Advanced Study

      Add to Reading List

      Source URL: eta.impa.br

      Language: English - Date: 2018-07-28 17:09:48
      180Computing / Software / Computer architecture / Skype / Videotelephony / Cryptographic protocols / Internet protocols / Skype protocol / Deep packet inspection / Voice over IP / BitTorrent protocol encryption / Transmission Control Protocol

      SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

      Add to Reading List

      Source URL: crysp.uwaterloo.ca

      Language: English - Date: 2018-08-13 15:14:33
      UPDATE