Computer Science

Results: 55984



#Item
161Computational complexity theory / Theoretical computer science / Logic in computer science / Complexity classes / Mathematical optimization / Boolean algebra / NP-complete problems / Boolean satisfiability problem / 2-satisfiability / Horn-satisfiability / P versus NP problem / Exponential time hypothesis

Advanced Topics in SAT-Solving Part II: Theoretical Aspects Carsten Sinz Wilhelm-Schickard-Institut for Computer Science University of T¨ubingen

Add to Reading List

Source URL: formal.iti.kit.edu

Language: English - Date: 2016-07-22 17:30:27
162One-shot learning / Artificial neural network / Bayesian inference / Outline of machine learning / Statistics / Probability and statistics / Applied mathematics

One-shot learning by inverting a compositional causal process Ruslan Salakhutdinov Dept. of Statistics and Computer Science University of Toronto

Add to Reading List

Source URL: cims.nyu.edu

Language: English - Date: 2013-11-10 18:34:06
163

Designing Robust Software Systems through Parametric Markov Chain Synthesis ˇ ska† , Simos Gerasimou∗ , Marta Kwiatkowska‡ and Nicola Paoletti§ Radu Calinescu∗ , Milan Ceˇ ∗ Department of Computer Science, U

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2017-03-10 09:53:57
    164Algebra / Mathematics / Spectral theory / Geometric group theory / Topological groups / Algebraic topology / Expander graph / Kazhdan's property / Ramanujan graph / Simplicial complex / Cohomology / Spectrum

    HIGH DIMENSIONAL EXPANDERS ALEXANDER LUBOTZKY Abstract. Expander graphs have been, during the last five decades, the subject of a most fruitful interaction between pure mathematics and computer science, with influence an

    Add to Reading List

    Source URL: eta.impa.br

    Language: English - Date: 2018-07-28 17:09:47
    165Operator theory / Symbol / Operator / Computability theory

    Stabilizing Floating-Point Programs Using Provenance Analysis Yijia Gu(B) and Thomas Wahl College of Computer and Information Science, Boston, USA {guyijia,wahl}@ccs.neu.edu

    Add to Reading List

    Source URL: www.ccs.neu.edu

    Language: English - Date: 2017-02-09 10:23:03
    166Computing / Internet privacy / Digital rights / Proxy servers / Internet censorship / Internet / Secure communication / Great Firewall / Internet censorship circumvention / Telex / Tor / Flash proxy

    1 SoK: Towards Grounding Censorship Circumvention in Empiricism Michael Carl Tschantz∗ , Sadia Afroz∗ , Anonymous‡ , and Vern Paxson∗† ∗ International Computer Science Institute

    Add to Reading List

    Source URL: internet-freedom-science.org

    Language: English - Date: 2016-04-13 13:52:54
    167Dynamic programming / Markov processes / Stochastic control / Markov models / Probability / Markov decision process / Markov chain / PP / Probabilistic CTL / Model checking

    Department of Computer Science INCREMENTAL RUNTIME VERIFICATION OF PROBABILISTIC SYSTEMS Vojtˇech Forejt

    Add to Reading List

    Source URL: www.cs.ox.ac.uk

    Language: English - Date: 2015-10-05 08:25:27
    168Business / Economy / Queueing theory / Management / Graph theory / Markov chain / Service level / Service-level agreement / Airbag / Statistical hypothesis testing / Sensitivity analysis / PEPA

    Evaluating quality of service for service level agreements Allan Clark and Stephen Gilmore Laboratory for Foundations of Computer Science, The University of Edinburgh, Edinburgh, Scotland

    Add to Reading List

    Source URL: www.dcs.ed.ac.uk

    Language: English - Date: 2006-08-30 07:27:10
    169Temporal logic / Artificial intelligence / Human behavior / Cognitive science / Logic / Linear temporal logic / Computation tree logic / Autonomous agent / Probabilistic logic / Trust / Humanrobot interaction / Practical reason

    Cognitive Reasoning and Trust in Human-Robot Interactions? Marta Kwiatkowska Department of Computer Science, University of Oxford, Oxford, UK Abstract. We are witnessing accelerating technological advances in autonomous

    Add to Reading List

    Source URL: qav.comlab.ox.ac.uk

    Language: English - Date: 2017-04-04 10:42:31
    170

    Leveraging Internet Background Radiation for Opportunistic Network Analysis Karyn Benson∗† , Alberto Dainotti† , kc claffy† , Alex C. Snoeren∗ , Michael Kallitsis‡ ∗ Computer Science and Engineering, UC Sa

    Add to Reading List

    Source URL: www.caida.org

    Language: English - Date: 2018-09-13 19:48:51
      UPDATE