Computer

Results: 301026



#Item
181Artificial neural networks / Computational neuroscience / Machine learning / Artificial intelligence / Applied mathematics / Computational linguistics / Natural language processing / Speech recognition / Convolutional neural network / Language model / Long short-term memory / Neural network

Published as a conference paper at ICLRP ROGRAM S YNTHESIS FOR C HARACTER L EVEL L ANGUAGE M ODELING Pavol Bielik, Veselin Raychev & Martin Vechev Department of Computer Science, ETH Z¨urich, Switzerland

Add to Reading List

Source URL: files.sri.inf.ethz.ch

Language: English - Date: 2018-09-05 10:55:59
182Computer vision / Stereophotogrammetry / 3D imaging / Artificial intelligence / Image processing / Robotic sensing / 3D reconstruction / Range imaging / Stereoscopy / Triangulation / Stereophonic sound / Visual odometry

Paper accepted at the European Conf. on Computer Vision (ECCV), Munich, Semi-Dense 3D Reconstruction with a Stereo Event Camera Yi Zhou1,2 , Guillermo Gallego3 , Henri Rebecq3 , Laurent Kneip4 , Hongdong Li1,2 , a

Add to Reading List

Source URL: rpg.ifi.uzh.ch

Language: English - Date: 2018-08-04 04:56:25
183Mathematics / Multiplication / Polynomials / Algebra / Multiplication algorithm / Computer algebra / ToomCook multiplication / Karatsuba algorithm / Degree of a polynomial / Finite field / Remainder / Computational complexity of mathematical operations

Smoothness Testing of Polynomials over Finite Fields Jean-Franc ¸ ois Biasse and Michael J. Jacobson Jr. Department of Computer Science, University of Calgary 2500 University Drive NW

Add to Reading List

Source URL: www.lix.polytechnique.fr

Language: English - Date: 2016-05-19 17:03:48
184Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
185Software / Computing / Computer-mediated communication / Instant messaging clients / Social media / Videotelephony / Computer access control / Cross-platform software / Signal / WhatsApp / Instant messaging / Authentication

Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 03:43:28
186Machine learning / Artificial intelligence / Learning / Statistical randomness / Q-learning / Metalearning / Reinforcement learning / Artificial neural network / Meta learning / Multi-armed bandit / Markov decision process / Feature learning

Under review as a conference paper at ICLRM ETA L EARNING S HARED H IERARCHIES Jonathan Ho, Xi Chen, Pieter Abbeel UC Berkeley, Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2017-10-26 20:31:00
187Theoretical computer science / Mathematical logic / Mathematics / Boolean algebra / Logic in computer science / Electronic design automation / Formal methods / NP-complete problems / Boolean satisfiability problem / Satisfiability modulo theories / Propositional calculus / Model checking

Verification Using SAT and SMT Solvers1 N. Shankar Computer Science Laboratory SRI International Menlo Park, CA

Add to Reading List

Source URL: dream.inf.ed.ac.uk

Language: English - Date: 2010-08-25 09:00:40
188Cryptocurrencies / Blockchains / Economy / Bitcoin / Computing / Money / Alternative currencies / Ethereum / Lightning Network / Smart contract / RootStock / Rebalancing investments

Revive: Rebalancing Off-Blockchain Payment Networks Rami Khalil Arthur Gervais Department of Computer Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-08-29 11:32:54
189Computing / Software engineering / Computer programming / Software bugs / Shellcode / Debuggers / GNU Debugger / Debugging / Stack buffer overflow / Buffer overflow / Python / Stack

EECS 388 Intro to Computer Security October 28, 2016 Project 4: Application Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:20
190Planetary science / Planetary geology / Astronomy / Nature / Lunar science / Impact crater / Meteorite / Secondary crater / Impact event / Meteoroid / Hypervelocity / Meteor Crater

Meteoritics & Planetary Science 40, Nr 6, 817–Abstract available online at http://meteoritics.org Earth Impact Effects Program: A Web-based computer program for calculating the regional environmental consequ

Add to Reading List

Source URL: www.purdue.edu

Language: English - Date: 2012-08-02 09:20:54
UPDATE