Computer University

Results: 29298



#Item
31Mathematics / Mathematical analysis / Temporal logic / Computation tree logic / Logic in computer science / Distribution / Symbol / Constructible universe / Linear temporal logic / Craig interpolation

Automatic Verification of Competitive Stochastic Systems Taolue Chen, Vojtˇech Forejt, Marta Kwiatkowska, David Parker, and Aistis Simaitis Department of Computer Science, University of Oxford, Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2012-01-06 05:40:55
32Software engineering / Computer programming / Computing / Interpolation / Video / Video signal / Craig interpolation / Pure / Foreach loop

Efficient Interpolation for the Theory of Arrays (work in progress) Jochen Hoenicke and Tanja Schindler∗ Department of Computer Science, University of Freiburg

Add to Reading List

Source URL: smt-workshop.cs.uiowa.edu

Language: English - Date: 2017-09-02 14:08:49
33Wireless networking / Computing / Information and communications technology / Computer networking / Technology / Network protocols / Data transmission / Internet of things / Vehicular ad hoc network / Wireless ad hoc network / Mobile ad hoc network / Network packet

Data Preference Matters: A New Perspective of Safety Data Dissemination in Vehicular Ad Hoc Networks Qiao Xiang1 , Xi Chen1, Linghe Kong1 , Lei Rao2 , Xue Liu1 1 School of Computer Science, McGill University, Canada, 2

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2015-04-14 12:02:56
34Mathematics / Combinatorics / Combinatorial optimization / Greedoid / Order theory / Matroid theory / Matroid / Universal property / Greedy algorithm

A Class of Greedy Algorithms And Its Relation to Greedoids Srinivas Nedunuri Dept. of Computer S ien es University of Texas at Austin

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2014-10-03 20:56:47
35Finite automata / Temporal logic / Automated planning and scheduling / Linear temporal logic / Theoretical computer science / Neuropsychology / Computational complexity theory / Model checking / Deterministic finite automaton / Finite-state machine / Nondeterministic finite automaton / Algorithm

Planning Under Uncertainty with Temporally Extended Goals Alberto Camacho ∗ Department of Computer Science University of Toronto. Canada.

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-16 07:11:20
36Formal languages / Mathematics / Theoretical computer science / Models of computation / Discrete mathematics / Nested word / Words / Bisimulation / Distribution / Deterministic pushdown automaton

Bisimilarity of Probabilistic Pushdown Automata Vojtěch Forejt1 , Petr Jančar2 , Stefan Kiefer1 , and James Worrell1 1 2 Department of Computer Science, University of Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2013-12-01 10:21:43
37Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-07-09 00:19:47
38Computing / Data management / Data / Business intelligence / Database management systems / Technology forecasting / Transaction processing / Dan Suciu / Big data / Probabilistic database / Data science / Analytics

University of Washington Database Group Quarterly Newsletter - FallUW Database Group Data management systems, cloud services, probabilistic databases, and data pricing in Computer Science & Engineering at the Univ

Add to Reading List

Source URL: db.cs.washington.edu

Language: English - Date: 2018-10-11 15:27:57
39Computer network security / Computing / Firewall software / Information and communications technology / Computer security / Data security / Internet censorship in China / Human rights in China / Firewall / Stateful firewall / Internet censorship / Router

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2011-03-10 12:58:06
40

Darko Marinov Professor Department of Computer Science University of Illinois at Urbana-Champaign http://mir.cs.illinois.edu/marinov

Add to Reading List

Source URL: mir.cs.illinois.edu

Language: English - Date: 2017-12-20 20:53:41
    UPDATE