Huang

Results: 2079



#Item
1Automated theorem proving / Concolic testing / Software testing / Equations / Z3 / Solver / Equation solving / Mathematics / Abstraction / Software engineering

DryadSynth: A Concolic SyGuS Solver Xiaokang Qiu (joint work with Kangjing Huang and Yanjun Wang) Purdue University SYNT Workshop

Add to Reading List

Source URL: www.react.uni-saarland.de

Language: English - Date: 2017-08-02 04:54:12
2Temporal logic / Mathematics / Mathematical analysis / Theoretical computer science / Linear temporal logic / Computation tree logic / IP / Symbol / Distribution / Craig interpolation / Universal representation

Model Checking Probabilistic Knowledge: A PSPACE Case Xiaowei Huang and Marta Kwiatkowska University of Oxford, UK Abstract Model checking probabilistic knowledge of memoryful semantics is undecidable, even for a simple

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2015-12-10 11:06:15
3Biology / Molecular biology / Biochemistry / Biotechnology / DNA / Cloud infrastructure / RNA / Bioinformatics / DNA sequencing / DNAnexus / ChIP-sequencing / RNA-Seq

HandsFree - Next Generation Sequence Processing, Mapping and Analysis Made Easy Phillipe Loher1, Nikos Vasilakis2, John Malamon1, Huang-Wen Chen3 and Isidore Rigoutsos1,* 1

Add to Reading List

Source URL: nikos.vasilak.is

Language: English - Date: 2013-07-02 11:59:51
4Mathematical analysis / Mathematics / Symbol / Continuous function / Kazhdan's property / Limit of a function / Ergodic theory / Hopf decomposition / Ergodic flow

Approximate Partial Order Reduction? Chuchu Fan, Zhenqi Huang, and Sayan Mitra University of Illinois at Urbana-Champaign, ECE Department {cfan10, zhuang25, mitras}@illinois.edu Abstract. We present a new partial order

Add to Reading List

Source URL: mitras.ece.illinois.edu

Language: English - Date: 2018-09-21 21:52:10
5Computing / Internet privacy / Information and communications technology / Hypertext Transfer Protocol / Cache / Computer network security / Middlebox / Hola / Proxy server / X-Forwarded-For / Web cache / HTTP cookie

Exploring HTTP Header Manipulation In-The-Wild Gareth Tyson Shan Huang Felix Cuadrado

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2017-02-16 04:03:04
6Cryptocurrencies / Bitcoin / Concurrent computing / Computing / Computer network security / Multi-agent systems / Spamming / Cybercrime / Botnet / Mining pool / ZeroAccess botnet / Satoshi Nakamoto

Botcoin: Monetizing Stolen Cycles Danny Yuxing Huang, Hitesh Dharmdasani† , Sarah Meiklejohn Vacha Dave, Chris Grier∗ , Damon McCoy† , Stefan Savage, Nicholas Weaver∗ Alex C. Snoeren and Kirill Levchenko UC San D

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
7Machine learning / Learning / Artificial intelligence / Meta learning / Support vector machine / Supervised learning / Training /  test /  and validation sets

Natural Language to Structured Query Generation via Meta-Learning Po-Sen Huang 1 Chenglong Wang 2 Rishabh Singh 3 * Wen-tau Yih 4 Xiaodong He 5 * 1. Introduction Conventional supervised training is a pervasive paradigm

Add to Reading List

Source URL: uclmr.github.io

Language: English - Date: 2018-08-06 06:17:49
8Mathematics / Computational complexity theory / Applied mathematics / Algorithm / Mathematical logic / Theoretical computer science / Mathematical optimization / Linear programming / Shortest path problem / Ant colony optimization algorithms / Genetic algorithm

Capacity Planning in a General Supply Chain with Multiple Contract Types by Xin Huang Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2018-07-20 12:49:56
9Computing / Cryptography / Cryptographic software / E-commerce / Internet Standards / Internet protocols / Secure communication / Transport Layer Security / Snippet / Microsoft CryptoAPI / Public-key cryptography / Application programming interface

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security Felix Fischer, Konstantin B¨ottinger, Huang Xiao, Christian Stransky∗ , Yasemin Acar∗ , Michael Backes∗ , Sascha Fahl∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:12
10Machine learning / Computing / Data management / Artificial intelligence / Computational neuroscience / Artificial neural networks / Computational linguistics / Meta learning / Supervised learning / Support vector machine / Deep learning / SQL syntax

Natural Language to Structured Query Generation via Meta-Learning Po-Sen Huang? , Chenglong Wang† , Rishabh Singh? , Wen-tau Yih‡ , Xiaodong He∗ ? Microsoft Research, † University of Washington, ‡ Allen Instit

Add to Reading List

Source URL: rishabhmit.bitbucket.io

Language: English - Date: 2018-06-25 09:59:57
UPDATE