Edu

Results: 1439644



#Item
1Cryptography / Computational complexity theory / Complexity classes / Interactive proof system / Zero-knowledge proof / NP / Probabilistically checkable proof / IP / Soundness / Commitment scheme / NEXPTIME / P versus NP problem

The Complexity of Zero Knowledge Salil Vadhan∗ School of Engineering and Applied Sciences Harvard University Cambridge, MA 02138

Add to Reading List

Source URL: people.seas.harvard.edu

Language: English - Date: 2010-03-21 22:20:21
2States and union territories of India / Mi Marathi / Maharashtra / Princeton Community Television

LITS_RobertWWoodruffLibrary_280_hz

Add to Reading List

Source URL: web.library.emory.edu

Language: English - Date: 2018-10-26 00:14:38
3Social information processing / Collaboration / Digital media / Wikipedia / Mass media / Wikis / Wiki / Aaron Halfaker / Criticism of Wikipedia

The Rise and Decline of an Open Collaboration System: How Wikipedia’s reaction to popularity is causing its decline Aaron Halfaker1 R. Stuart Geiger2

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-04-18 14:06:53
4Chemistry / Academia / Interdisciplinarity / Knowledge / Pedagogy / Radon / Education

InterdisciplinaryStudies_BS.pdf

Add to Reading List

Source URL: catalog.southernct.edu

Language: English - Date: 2018-10-06 18:04:51
5

Reactive Vega: A Streaming Dataflow Architecture for Declarative Interactive Visualization Arvind Satyanarayan, Ryan Russell, Jane Hoffswell, and Jeffrey Heer Internal External

Add to Reading List

Source URL: idl.cs.washington.edu

Language: English
    6Mathematics / Probabilistically checkable proof / IP / Algebra / Creativity

    COSC 544 Probabilistic Proof SystemsGGPR: A Linear PCP Of Size |F|O(S) Lecturer: Justin Thaler

    Add to Reading List

    Source URL: people.cs.georgetown.edu

    Language: English - Date: 2017-11-02 08:56:25
    7Cryptography / Exponentials / Cross-platform software / Cryptographic software / GNU Privacy Guard / OpenPGP / Privacy software / RSA / Exponentiation by squaring / Modular exponentiation / ElGamal encryption / Chosen-ciphertext attack

    Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation (extended version) Daniel Genkin Lev Pachmanov

    Add to Reading List

    Source URL: web.eecs.umich.edu

    Language: English - Date: 2017-08-28 18:24:31
    8Formal methods / Theoretical computer science / Software engineering / Logic in computer science / Software development / Semigroup action / Refinement / Predicate transformer semantics / Program transformation / Postcondition / Finite-state machine / Formal verification

    Requirement Enforcement by Transformation Automata Douglas R. Smith Kestrel Institute 3260 Hillview Avenue Palo Alto, CaliforniaUSA

    Add to Reading List

    Source URL: www.kestrel.edu

    Language: English - Date: 2012-08-02 20:33:11
    9Student exchange / Education / Culture / Human behavior / Carnegie Mellon University / Carnegie Mellon Silicon Valley / International student / Host family / Kigali

    Host Family Program Carnegie Mellon University-Africa is proud to announce the launch of a Host Family Program for International Students in our Kigali Campus. Host family is a vital part of a cultural exchange, immersin

    Add to Reading List

    Source URL: www.africa.engineering.cmu.edu

    Language: English - Date: 2018-09-12 05:46:12
    10Artificial intelligence / Learning / Machine learning / Computational linguistics / Markov models / Hierarchical hidden Markov model / Bayesian statistics / Speech recognition / Hidden Markov model / Dynamic time warping / Language model / Speech perception

    One-shot learning of generative speech concepts Brenden M. Lake* Chia-ying Lee* James R. Glass

    Add to Reading List

    Source URL: cims.nyu.edu

    Language: English - Date: 2014-05-02 16:26:56
    UPDATE