Computer University

Results: 29298



#Item
81Software / Computing / Computer-mediated communication / Instant messaging clients / Social media / Videotelephony / Computer access control / Cross-platform software / Signal / WhatsApp / Instant messaging / Authentication

Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 03:43:28
82Theoretical computer science / Mathematics / Formal languages / Discrete mathematics / Graph theory / Graph rewriting / Logic in computer science / Rewriting / Rewrite order / Confluence / Graph / Abstract semantic graph

master thesis in computer science by Maria A Schett submitted to the Faculty of Mathematics, Computer Science and Physics of the University of Innsbruck

Add to Reading List

Source URL: www.maria-a-schett.net

Language: English - Date: 2016-12-11 09:15:03
83Computing / Cluster analysis / Data mining / Geostatistics / Data analysis / Computational statistics / Hierarchical clustering / K-means clustering / Computer cluster / Consensus clustering / Spectral clustering

Power Signatures of High-Performance Computing Workloads Jacob Combs, Jolie Nazor, Rachelle Thysell, Fabian Santiago, Matthew Hardwick, Lowell Olson, Suzanne Rivoire Department of Computer Science Sonoma State University

Add to Reading List

Source URL: rivoire.cs.sonoma.edu

Language: English - Date: 2017-05-29 18:44:27
84Computing / Hacking / Human behavior / Information and communications technology / Telephone tapping / Computer programming / Hacker / Internet security / Wargame / Security hacker

Organising Monkeys or How to Run a Hacking Club Andreea-Ina Radu, Sam L. Thomas School of Computer Science University of Birmingham Email: {A.I.Radu, S.L.Thomas}@cs.bham.ac.uk Abstract—We describe the organisation of t

Add to Reading List

Source URL: afnom.net

Language: English - Date: 2018-10-16 09:54:50
85Computing / Computer systems / Edsger W. Dijkstra / Software architecture / Software engineering / Scalability / Big data / Database / Information and communications technology / Computer engineering

INVITED SPEAKER SEMINAR IN ELECTRICAL AND COMPUTER ENGINEERING CO-SPONSORED BY: The Department of Electrical and Computer Engineering, Concordia University, IEEE Montreal Section,

Add to Reading List

Source URL: users.encs.concordia.ca

Language: English - Date: 2014-04-11 16:22:00
86Probability theory / Statistical randomness / Probability / Markov models / Stochastic game / Markov chain / Determinacy / Game theory / Strategy / Probabilistic automaton / Markov decision process / Stochastic process

Compositional Strategy Synthesis for Stochastic Games with Multiple Objectives N. Basseta , M. Kwiatkowskaa,∗, C. Wiltschea a Department of Computer Science, University of Oxford, United Kingdom

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2017-04-04 09:30:36
87

Recommendations in Signed Social Networks Jiliang Tang‡ , Charu Aggarwal# , and Huan Liu† † Computer Science & Engineering, Arizona State University, Tempe, AZ, USA ‡

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 01:18:50
    88Theoretical computer science / Computing / Computer science / Symposium on Principles of Programming Languages / Electronic design automation / Formal methods / Logic in computer science / Computer Aided Verification / Helmut Veith / High-level synthesis / Formal verification / Computer music

    Roopsha Samanta Assistant Professor Department of Computer Science Purdue University Í

    Add to Reading List

    Source URL: www.cs.purdue.edu

    Language: English - Date: 2016-10-03 12:50:28
    89Information theory / Statistical theory / Mathematics / Mathematical analysis / Entropy / Mutual information / Expected value / Confidence interval / Information flow / Binomial distribution / Conditional entropy / Quantities of information

    LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2? , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    Language: English - Date: 2017-06-07 20:45:26
    90Mathematical analysis / Measure theory / Mathematics / Probability and statistics / Determinacy / Stochastic game / Strategy / Markov chain / Stochastic process / Support / Mathematical optimization / Statistical model

    On Stochastic Games with Multiple Objectives Taolue Chen, Vojtˇech Forejt, Marta Kwiatkowska, Aistis Simaitis, and Clemens Wiltsche Department of Computer Science, University of Oxford, United Kingdom Abstract. We stud

    Add to Reading List

    Source URL: www.prismmodelchecker.org

    Language: English - Date: 2015-10-18 19:42:36
    UPDATE