Computer Science

Results: 55984



#Item
911

Constraint Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly Shmatikov Computer Science Laboratory, SRI International, Menlo Park, CAUSA fmillen,

Add to Reading List

Source URL: jonmillen.com

Language: English - Date: 2017-01-20 09:49:12
    912

    Approximate Policy Iteration with Demonstration Data Beomjoon Kim School of Computer Science McGill University Montreal, Quebec, Canada

    Add to Reading List

    Source URL: www.sologen.net

    Language: English - Date: 2013-10-24 08:38:57
      913Computing / Internet / Information and communications technology / Terms of service / Computer network security / Internet privacy / Browser security / Privacy / Tor / Association for Computing Machinery / Internet security

      Peter Snyder Department of Computer Science University of Illinois at Chicago Chicago, IL 60607

      Add to Reading List

      Source URL: www.peteresnyder.com

      Language: English - Date: 2018-05-14 00:35:08
      914

      Two Ways of Discovering the Size and Shape of a Computer Program to Solve a Problem John R. Koza Computer Science Department Stanford University

      Add to Reading List

      Source URL: www.genetic-programming.com

      Language: English - Date: 2006-11-17 21:17:58
        915

        Fitting Smooth Surfaces to Dense Polygon Meshes Venkat Krishnamurthy Marc Levoy Computer Science Department Stanford University

        Add to Reading List

        Source URL: graphics.stanford.edu

        Language: English - Date: 1997-05-06 18:31:59
          916

          Science of Computer Programming–165 www.elsevier.com/locate/scico Type inference against races Cormac Flanagan a,∗ , Stephen N. Freund b a Computer Science Department, University of California at Santa

          Add to Reading List

          Source URL: dept.cs.williams.edu

          Language: English - Date: 2018-08-12 09:38:05
            917

            Modelling and Verification of Web Services Business Activity Protocol Anders P. Ravn, Jiˇr´ı Srba? , and Saleem Vighio?? Department of Computer Science, Aalborg University, Selma Lagerl¨ ofs Vej 300, DK-9220 Aalborg

            Add to Reading List

            Source URL: www.it.uu.se

            Language: English - Date: 2010-12-14 04:51:50
              918

              Practical everlasting privacy Myrto Arapinis1 , V´eronique Cortier2 , Steve Kremer2 , and Mark Ryan1 1 School of Computer Science, University of Birmingham 2

              Add to Reading List

              Source URL: www.cs.bham.ac.uk.

              Language: English - Date: 2013-04-19 15:49:07
                919

                Learning Deep Neural Network Policies with Continuous Memory States Marvin Zhang, Zoe McCarthy, Chelsea Finn, Sergey Levine, Pieter Abbeel Department of Electrical Engineering and Computer Science, UC Berkeley {zhangmarv

                Add to Reading List

                Source URL: www.thespermwhale.com

                Language: English - Date: 2015-11-25 22:12:00
                  UPDATE