Information and Computer Science

Results: 6880



#Item
781

Linkoping Electronic Articles in Computer and Information Science Vol): nr 13 A Floyd-Hoare Method for

Add to Reading List

Source URL: www.ep.liu.se

Language: English - Date: 2007-07-13 07:56:49
    782

    Approximate Inference in Probabilistic Graphical Models with Determinism Vibhav Gogate Donald Bren School of Information and Computer Science University of California, Irvine, CA 92697, USA

    Add to Reading List

    Source URL: www.hlt.utdallas.edu

    Language: English
      783Academia / Knowledge / Engineering / Abstraction / Philosophy of artificial intelligence / Formal sciences / Complex systems theory / Computer engineering / Computer science / Philosophy of information / Philosophy / Mathematics

      Philosophy of Computer Science: PoC Meets AI and Law (Roundtable Discussion) Organized by Rainhard Bengez, TU Muenchen, Germany () Raymond Turner, University of Essex, UK ()

      Add to Reading List

      Source URL: events.cs.bham.ac.uk

      Language: English - Date: 2011-12-13 05:13:50
      784

      On the Approximability of Some Network Design Problems JULIA CHUZHOY Computer Science and Artificial Intelligence Laboratory, MIT and Deptartment of Computer and Information Science, University of Pennsylvania ANUPAM GUP

      Add to Reading List

      Source URL: ttic.uchicago.edu

      Language: English - Date: 2008-07-08 17:50:51
        785Prevention / Security / Safety / Computer security / National security / Actuarial science / Cryptography / Information security / Risk management / Threat / Risk / Nippon Telegraph and Telephone

        Corporate Overview Why organisations trust NTT Com Security Who we are We’re a globally respected information

        Add to Reading List

        Source URL: www.nttcomsecurity.com

        Language: English - Date: 2015-07-21 04:25:37
        786

        Bridging the gap between agent and environment: the missing body Julien Saunier Computer Science, Information Processing and Systems Laboratory (LITIS), INSA-Rouen, ´

        Add to Reading List

        Source URL: homepage.lnu.se

        Language: English - Date: 2014-03-22 08:12:19
          787Humancomputer interaction / Computer science / Human communication / Interpersonal communication / Scott Hudson / Association for Computing Machinery / Human-Computer Interaction Institute / ACM Symposium on User Interface Software and Technology / Conference on Human Factors in Computing Systems / George G. Robertson

          Steve Oney School of Information University of Michigan 4381 North Quadrangle 105 South State Street Ann Arbor, MI 48109

          Add to Reading List

          Source URL: from.so

          Language: English - Date: 2016-01-31 20:12:38
          788

          Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and Matt Blaze Dept. of Computer and Information Science, University of Pennsylvania Philadelphia,

          Add to Reading List

          Source URL: security.cs.georgetown.edu

          Language: English - Date: 2010-07-16 14:58:20
            789

            IADIS International Journal on Computer Science and Information Systems Vol. 9, No. 2, ppISSN: AUTONOMOUS ACQUISITION OF NATURAL SITUATED COMMUNICATION

            Add to Reading List

            Source URL: xenia.media.mit.edu

            Language: English - Date: 2015-06-09 09:45:57
              790

              Linear Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University School of Science June 6, 2013

              Add to Reading List

              Source URL: ice.mat.dtu.dk

              Language: English - Date: 2013-06-07 10:08:29
                UPDATE