Department

Results: 775307



#Item
291Cryptography / Mathematics / Post-quantum cryptography / Lattice-based cryptography / Lie groups / Computational hardness assumptions / Lattice problem / Lattice / Euclidean algorithm / LenstraLenstraLovsz lattice basis reduction algorithm / Ideal lattice cryptography / Short integer solution problem

Gauss Sieve Algorithm on GPUs Shang-Yi Yang1 , Po-Chun Kuo1(B) , Bo-Yin Yang2 , and Chen-Mou Cheng1 1 Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan {ilway25,kbj,doug}@crypto.tw

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2018-05-28 18:07:35
292Software engineering / Java Pathfinder / Computer programming / Computing / Const / Obfuscation / Assembly languages / Programming language syntax / Java / P-code machine

Using Java Pathfinder to Reason about Agent Systems Franco Raimondi Department of Computer Science Middlesex University

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2015-11-05 09:33:47
293

Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks Kai Sheng Tai, Richard Socher*, Christopher D. Manning Computer Science Department, Stanford University, *MetaMind Inc. fo

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-06-01 20:23:35
    294Mathematical analysis / Mathematics / Statistical randomness / Measure theory / Boolean algebra / Experiment / Sigma-algebra / Markov chain / Determinacy / Linear temporal logic / Stochastic game / Markov decision process

    Synthesis for Multi-Objective Stochastic Games: An Application to Autonomous Urban Driving Taolue Chen, Marta Kwiatkowska, Aistis Simaitis, and Clemens Wiltsche Department of Computer Science, University of Oxford, Unite

    Add to Reading List

    Source URL: www.prismmodelchecker.org

    Language: English - Date: 2013-06-03 18:23:17
    295Economy / Financial services / Finance / Money laundering / Electronic funds transfer / 91st United States Congress / Bank Secrecy Act / Euronet Worldwide / Bank / Federal Reserve / Central bank

    § CFR Ch. IX (7–1–12 Edition) immediately upon request by the Department of Justice. § 904.4 Minimum amount of referrals

    Add to Reading List

    Source URL: www.gpo.gov

    Language: English - Date: 2018-03-19 22:18:04
    296Software testing / Computer security / Security engineering / Cyberwarfare / Cybercrime / Computer network security / Fuzzing / Software bugs / Application security / Vulnerability / Internet of things / Heartbleed

    Poster: IoTcube: An Automated Analysis Platform for Finding Security Vulnerabilities Seulbae Kim, Seunghoon Woo, Heejo Lee, Hakjoo Oh Department of Computer Science and Engineering Korea University Seoul, Korea

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-21 15:07:31
    297Artificial neural networks / Mathematics / Information science / Applied mathematics / Collective intelligence / Computational neuroscience / Feature detection / Search algorithms / Cold start / Recommender system / Collaborative filtering / K-means clustering

    PlateClick: Bootstrapping Food Preferences Through an Adaptive Visual Interface Longqi Yang†,‡ , Yin Cui†,‡ , Fan Zhang†,‡ , John P. Pollak‡ , Serge Belongie†,‡ , Deborah Estrin†,‡ † Department o

    Add to Reading List

    Source URL: www.cs.cornell.edu

    Language: English - Date: 2018-10-25 09:08:19
    298Computing / Information theory / Information and communications technology / Telecommunications engineering / Data transmission / Network performance / Computer networking / Internet architecture / Multipath routing / Transmission Control Protocol / Packet loss / Routing

    Deadline-Aware Multipath Communication: An Optimization Problem Laurent Chuat∗ , Adrian Perrig∗ , Yih-Chun Hu† of Computer Science, ETH Zurich, Switzerland † Department of Electrical and Computer Engineering, Uni

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English
    299Technology / Mobile technology / Information and communications technology / Mobile telecommunications / Mobile phone / New media / Telephony / Videotelephony / Text messaging / SMS / Subscriber identity module / Mobile Web

    Kei-Tying teens: Using mobile phone e-mail to bond, bridge, and break with social ties – a study of Japanese adolescents 1 Jeffrey Boasea∗ , Tetsuro Kobayashib a Department of Social Psychology, The University of To

    Add to Reading List

    Source URL: individual.utoronto.ca

    Language: English - Date: 2017-09-21 13:37:53
    300Finite-state machine / Image segmentation / Machine learning / Cellular automata / Finite automata / Automata theory / Cognition / Cognitive science / Artificial intelligence

    Towards inferring environment models for control functions from recorded signal data Henrik Peters, Falk Howar, Andreas Rausch Clausthal University of Technology, Department of Informatics Julius-Albert-Str. 4, 38678 Cla

    Add to Reading List

    Source URL: www.falkhowar.de

    Language: English - Date: 2018-09-30 08:43:02
    UPDATE