Computer

Results: 301026



#Item
201Theoretical computer science / Computing / Computer science / Symposium on Principles of Programming Languages / Electronic design automation / Formal methods / Logic in computer science / Computer Aided Verification / Helmut Veith / High-level synthesis / Formal verification / Computer music

Roopsha Samanta Assistant Professor Department of Computer Science Purdue University Í

Add to Reading List

Source URL: www.cs.purdue.edu

Language: English - Date: 2016-10-03 12:50:28
202Information theory / Statistical theory / Mathematics / Mathematical analysis / Entropy / Mutual information / Expected value / Confidence interval / Information flow / Binomial distribution / Conditional entropy / Quantities of information

LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
203Information science / Collective intelligence / Recommender systems / Information retrieval / Collaboration / Social information processing / Information systems / Collaborative filtering / Matrix factorization / Machine learning / Personalization

TRecSo: Enhancing Top-k Recommendation With Social Information ∗ Chanyoung Park, Donghyun Kim, Jinoh Oh, Hwanjo Yu† Dept. of Computer Science and Engineering

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:59:03
204Mathematical analysis / Measure theory / Mathematics / Probability and statistics / Determinacy / Stochastic game / Strategy / Markov chain / Stochastic process / Support / Mathematical optimization / Statistical model

On Stochastic Games with Multiple Objectives Taolue Chen, Vojtˇech Forejt, Marta Kwiatkowska, Aistis Simaitis, and Clemens Wiltsche Department of Computer Science, University of Oxford, United Kingdom Abstract. We stud

Add to Reading List

Source URL: www.prismmodelchecker.org

Language: English - Date: 2015-10-18 19:42:36
205Concurrent computing / Parallel computing / Computing / Computer programming / Manycore processor / Data parallelism / General-purpose computing on graphics processing units / Parallel programming model / Multi-core processor / Thread / CUDA / OpenMP

A Breadth-First Course in Multicore and Manycore Programming Suzanne Rivoire Sonoma State University Department of Computer Science

Add to Reading List

Source URL: rivoire.cs.sonoma.edu

Language: English - Date: 2017-05-29 18:45:10
206Cryptography / Stream ciphers / Vigenre cipher / Ciphertext / Cryptanalysis / Caesar cipher

EECS 388 Intro to Computer Security September 16, 2016 Homework 2: Cryptanalysis

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
207Education / Learning / Human behavior / Pedagogy / Segregation / Educational psychology / Higher education / Universal Design for Learning / Philosophy of education / Educational technology / Inclusion / Accessibility

SIGCSE 2011 Poster Proposal: Universal Design for Learning in CS1 Suzanne Rivoire Department of Computer Science Sonoma State University, Rohnert Park, CA, USA

Add to Reading List

Source URL: rivoire.cs.sonoma.edu

Language: English - Date: 2017-05-29 18:45:15
208Symbol

Expected Reachability-Time Games Vojtˇech Forejta , Marta Kwiatkowskaa , Gethin Normanb , Ashutosh Trivedic a Department of Computer Science, University of Oxford, UK. of Computing Science, University of Glasgow, UK.

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2016-04-15 06:20:35
    209Cluster analysis / Data mining / Geostatistics / Hierarchical clustering / Data analysis / Information science / Principal component analysis / Computational statistics / Document clustering / K-means clustering

    Application Power Signature Analysis Chung-Hsing Hsu∗ , Jacob Combs† , Jolie Nazor† , Fabian Santiago† , Rachelle Thysell† , Suzanne Rivoire† and Stephen W. Poole∗ ∗ Computer Science and Mathematics Divi

    Add to Reading List

    Source URL: rivoire.cs.sonoma.edu

    Language: English - Date: 2017-05-29 18:44:47
    210Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

    An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2006-02-10 14:35:40
    UPDATE