Information and Computer Science

Results: 6880



#Item
301Quantum mechanics / Quantum information science / Theoretical computer science / Physics / Quantum information theory / Quantum computing / Quantum information / Qubit / Quantum refereed game

Towards Characterizing the Non-Locality of Entangled Quantum States Renato Renner∗ and Stefan Wolf† November 30, 2007 Abstract

Add to Reading List

Source URL: cqi.inf.usi.ch

Language: English - Date: 2012-11-05 03:42:50
302Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Data security / Information security / Systems engineering / Computer security

Master of Science Program in Information Technology Degree RequirementsIT 5413 Software Design and Development IT 5443 Web

Add to Reading List

Source URL: ccse.kennesaw.edu

Language: English - Date: 2015-08-15 14:09:11
303Quantum cryptography / Cryptography / Quantum information science / Theoretical computer science / Physics / Quantum key distribution / BB84 / Photon / Quantum network

Quantum  cryptography  with   pseudorandom  bases  and  the   problem  of  quantum  state   discrimina8on   P.A.  Tregubov  and  A.S.  Trushechkin    

Add to Reading List

Source URL: ctcrypt.ru

Language: English - Date: 2016-06-10 06:35:53
304Operations research / Numerical software / Artificial intelligence / Mathematical optimization / Solver / Business process management / Frame language / Software / Information technology / Theoretical computer science

Towards an Approach for Orchestrating Design Space Exploration Problems to Fix Multi-Paradigm Inconsistencies Sebastian J. I. Herzig, Benjamin Kruse, Federico Ciccozzi, Joachim Denil, Rick Salay, and D´aniel Varr´o seb

Add to Reading List

Source URL: ceur-ws.org

Language: English - Date: 2014-09-10 09:14:57
305Software / Computing / Computer architecture / Smartphones / Android / Mobile operating systems / Internet privacy / Mobile app / Privacy / Google Play / App Store / Privacy concerns with social networking services

Taming Information-Stealing Smartphone Applications (on Android) Yajin Zhou1 , Xinwen Zhang2 , Xuxian Jiang1 , and Vincent W. Freeh1 1 Department of Computer Science, NC State University

Add to Reading List

Source URL: yajin.org

Language: English - Date: 2016-06-04 10:52:06
306Science / Infographics / Computational science / Computer graphics / Sociology / Visualization / Network theory / Community structure / Social network / Information visualization / Dynamic network analysis / Social network analysis software

Volume), Number 3 Eurographics / IEEE Symposium on VisualizationEuroVisH. Hauser, H. Pfister, and J. J. van Wijk (Guest Editors)

Add to Reading List

Source URL: vis.ninja

Language: English - Date: 2014-10-10 17:04:00
307Security / Prevention / Safety / Computer access control / Computer security / Crime prevention / National security / Single sign-on / Password / Authentication / Cyber-security regulation / Information security

DesignSafe CyberSecurity Plan 1.   Overview DesignSafe is an open CI that enables and supports leading-edge scientific discovery and promotes science and technology education. While it must be a widely accessible platfo

Add to Reading List

Source URL: www.designsafe-ci.org

Language: English - Date: 2016-05-18 14:32:56
308Business / Education / Professional studies / Human resource management / Industrial and organizational psychology / Workload / Workplace / Cognitive load

Understanding Changes in Mental Workload during Task Execution Shamsi T. Iqbal, Piotr D. Adamczyk♦, Xianjun Sam Zheng†, and Brian P. Bailey Department of Computer Science, School of Library and Information Science♦

Add to Reading List

Source URL: orchid.cs.illinois.edu

Language: English - Date: 2014-11-23 14:59:37
309Quantum information science / Quantum mechanics / Theoretical computer science / Qubit / Controlled NOT gate / Flux qubit / Dynamical decoupling

Fully pulse-controlled gate operations on always coupled qubit chains Holger Frydrych,1 Michael Marthaler,2 and Gernot Alber1 1

Add to Reading List

Source URL: www.qec14.ethz.ch

Language: English - Date: 2015-02-02 04:47:42
310Machine learning / Artificial intelligence / Ensemble learning / Learning / Boosting / Statistical classification / AdaBoost / Pattern recognition / Feature selection / Support vector machine / Random forest

Comparative Study of Speaker Personality Traits Recognition in Conversational and Broadcast News Speech Firoj Alam, Giuseppe Riccardi Department of Information Engineering and Computer Science, University of Trento, Ital

Add to Reading List

Source URL: www.sensei-conversation.eu

Language: English - Date: 2014-08-04 05:20:02
UPDATE