Computer Science

Results: 55984



#Item
111Model checkers / Software engineering / Formal methods / Theoretical computer science / Software quality / Computing / PRISM model checker / Model checking / Formal verification / Markov chain / Stochastic / Reliability engineering

Advances and Challenges of Quantitative Verification and Synthesis for Cyber-Physical Systems Marta Kwiatkowska Department of Computer Science, University of Oxford, UK Abstract—We are witnessing a huge growth of cyber

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2016-09-02 06:46:32
112Mathematical software / Application software / Software / Theoretical computer science / Formal methods / Logic in computer science / Discrete mathematics / Verification / Quantifier elimination / Formal verification / Model checking / Computer science

Ritwika Ghosh phone : (+email : Profile : I am a first year graduate student in Computer Science at the University of Illinois, Urbana-Champaign, interested in formal methods, and appl

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-02-28 12:52:15
113Probability theory / Statistical randomness / Probability / Markov models / Graph theory / Stochastic game / Probabilistic automaton / Game theory / Markov chain / Determinacy / Strategy / Markov decision process

Compositional Strategy Synthesis for Stochastic Games with Multiple Objectives N. Basseta , M. Kwiatkowskaa,⇤, C. Wiltschea a Department of Computer Science, University of Oxford, United Kingdom

Add to Reading List

Source URL: www.prismmodelchecker.org

Language: English - Date: 2017-06-28 16:10:52
114Machine learning / Learning / Artificial intelligence / Applied mathematics / Artificial neural network / Outline of machine learning / Supervised learning / Regularization / Empirical risk minimization / Backpropagation / Poisson regression / Parametric model

Mathematics of Machine Learning: An introduction Sanjeev Arora Princeton University Computer Science Institute for Advanced Study

Add to Reading List

Source URL: eta.impa.br

Language: English - Date: 2018-07-28 17:09:48
115Computing / Software / Computer architecture / Skype / Videotelephony / Cryptographic protocols / Internet protocols / Skype protocol / Deep packet inspection / Voice over IP / BitTorrent protocol encryption / Transmission Control Protocol

SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

Add to Reading List

Source URL: crysp.uwaterloo.ca

Language: English - Date: 2018-08-13 15:14:33
116Artificial neural networks / Computational neuroscience / Machine learning / Artificial intelligence / Applied mathematics / Computational linguistics / Natural language processing / Speech recognition / Convolutional neural network / Language model / Long short-term memory / Neural network

Published as a conference paper at ICLRP ROGRAM S YNTHESIS FOR C HARACTER L EVEL L ANGUAGE M ODELING Pavol Bielik, Veselin Raychev & Martin Vechev Department of Computer Science, ETH Z¨urich, Switzerland

Add to Reading List

Source URL: files.sri.inf.ethz.ch

Language: English - Date: 2018-09-05 10:55:59
117Mathematics / Multiplication / Polynomials / Algebra / Multiplication algorithm / Computer algebra / ToomCook multiplication / Karatsuba algorithm / Degree of a polynomial / Finite field / Remainder / Computational complexity of mathematical operations

Smoothness Testing of Polynomials over Finite Fields Jean-Franc ¸ ois Biasse and Michael J. Jacobson Jr. Department of Computer Science, University of Calgary 2500 University Drive NW

Add to Reading List

Source URL: www.lix.polytechnique.fr

Language: English - Date: 2016-05-19 17:03:48
118Information theory / Cryptography / Information / Electrical engineering / Information flow / Information leakage / Leak / Entropy / Weka / Memory leak / Mutual information / Biometric passport

A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
119Software / Computing / Computer-mediated communication / Instant messaging clients / Social media / Videotelephony / Computer access control / Cross-platform software / Signal / WhatsApp / Instant messaging / Authentication

Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 03:43:28
120Machine learning / Artificial intelligence / Learning / Statistical randomness / Q-learning / Metalearning / Reinforcement learning / Artificial neural network / Meta learning / Multi-armed bandit / Markov decision process / Feature learning

Under review as a conference paper at ICLRM ETA L EARNING S HARED H IERARCHIES Jonathan Ho, Xi Chen, Pieter Abbeel UC Berkeley, Department of Electrical Engineering and Computer Science

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2017-10-26 20:31:00
UPDATE