Computer

Results: 301026



#Item
261Software engineering / Computer programming / Theoretical computer science / Automated theorem proving / Lisp / ACL2 / Formal methods / Logic in computer science / Robert S. Boyer

Industrial Use of ACL2: Applications, Achievements, Challenges, and Directions J Strother Moore and Marijn J.H. Heule Department of Computer Science The University of Texas at Austin {moore,marijn}@cs.utexas.edu

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2017-07-30 15:10:42
262Humancomputer interaction / Reality / Computing / User interface techniques / Augmented reality / Mixed reality / Virtual reality / Multimodal interaction / Microsoft HoloLens / Head-mounted display / Internet privacy / JavaScript

1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:40
263Software engineering / Java Pathfinder / Computer programming / Computing / Const / Obfuscation / Assembly languages / Programming language syntax / Java / P-code machine

Using Java Pathfinder to Reason about Agent Systems Franco Raimondi Department of Computer Science Middlesex University

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2015-11-05 09:33:47
264Software engineering / Computer programming / Computing / Proof assistants / Logic in computer science / Functional languages / Automated theorem proving / Theoretical computer science / HOL / Logic for Computable Functions / Automated reasoning / ML

Steps Towards Verified Implementations of HOL Light Magnus O. Myreen1 , Scott Owens2 , and Ramana Kumar1 1 Computer Laboratory, University of Cambridge, UK

Add to Reading List

Source URL: cakeml.org

Language: English - Date: 2013-05-10 10:01:51
265Computing / Computer access control / Computer security / Cloud standards / Federated identity / Internet protocols / Cryptographic protocols / OAuth / Cross-site request forgery / Social login / OpenID / Single sign-on

Journal of Computer Security–657 DOIJCSIOS Press 601

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2014-05-01 06:38:12
266

Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks Kai Sheng Tai, Richard Socher*, Christopher D. Manning Computer Science Department, Stanford University, *MetaMind Inc. fo

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-06-01 20:23:35
    267System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

    Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 15:46:40
    268Mathematical analysis / Mathematics / Statistical randomness / Measure theory / Boolean algebra / Experiment / Sigma-algebra / Markov chain / Determinacy / Linear temporal logic / Stochastic game / Markov decision process

    Synthesis for Multi-Objective Stochastic Games: An Application to Autonomous Urban Driving Taolue Chen, Marta Kwiatkowska, Aistis Simaitis, and Clemens Wiltsche Department of Computer Science, University of Oxford, Unite

    Add to Reading List

    Source URL: www.prismmodelchecker.org

    Language: English - Date: 2013-06-03 18:23:17
    269Control theory / Systems science / Automated planning and scheduling / Classical control theory / Metaphysics / Mathematical optimization / Systems theory / Nonlinear system / Planning Domain Definition Language / Motion planning / Controllability / Trajectory optimization

    Mixed Discrete-Continuous Planning with Complex Behaviors Enrique Fernandez-Gonzalez Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory 32 Vassar Street, Building, Cambri

    Add to Reading List

    Source URL: icaps16.icaps-conference.org

    Language: English - Date: 2016-06-09 08:09:29
    270Software testing / Computer security / Security engineering / Cyberwarfare / Cybercrime / Computer network security / Fuzzing / Software bugs / Application security / Vulnerability / Internet of things / Heartbleed

    Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-21 15:07:31
    UPDATE