Institute

Results: 275473



#Item
41Metaphysics / Cognitive science / Neuroscience / Computational neuroscience / Cognitive neuroscience / Philosophy of science / Emergence / Mind / Neurophilosophy / Theory / Neural network / Occam's razor

Towards a common philosophy of explanation for artificial and biological intelligence Jessica A Thompson () International Laboratory for Brain, Music and Sound (BRAMS) Montreal Institute for Learni

Add to Reading List

Source URL: thompsonj.github.io

Language: English - Date: 2018-09-05 18:08:48
42

Wireless Institute of Australia INFORMATION PAPER AUSTRALIAN REPEATER DIRECTORY Please advise any corrections or additions to: , or by mail to WIA Repeater Directory, PO Box 2042, Bayswater,

Add to Reading List

Source URL: www.wia.org.au

Language: English - Date: 2018-08-08 01:12:24
    43Constraint programming / Mathematics / Lattice theory / Mathematical optimization / Applied mathematics / Constraint satisfaction / Local consistency / Semilattice / Linear programming / Optimization problem / Constraint / Feasible region

    in Knowledge Engineering Reviews, 2001 Synthesis of EÆcient Constraint Satisfaction Programs Stephen J. Westfold and Douglas R. Smith Kestrel Institute 3260 Hillview Avenue

    Add to Reading List

    Source URL: www.kestrel.edu

    Language: English - Date: 2012-08-02 20:59:14
    44Economy / Money / Finance / Banking / Financial markets / Bank / Short / Central bank / Market liquidity / Shadow banking system / Subprime crisis background information / Reserve Bank of India

    HONG KONG INSTITUTE FOR MONETARY RESEARCH LIQUIDITY SHOCKS AND “BORROW TO LEND” SHADOW BANKING ACTIVITIES Zhibo Tan

    Add to Reading List

    Source URL: www.hkimr.org

    Language: English - Date: 2018-05-30 02:51:14
    45Software testing / Software engineering / Computing / Quality / Fault injection / Software verification / Reliability engineering / Formal verification / Flash memory / Software quality / Stress testing / Exception handling

    Randomized Differential Testing as a Prelude to Formal Verification Alex Groce, Gerard Holzmann, and Rajeev Joshi Laboratory for Reliable Software ∗ Jet Propulsion Laboratory California Institute of Technology Pasadena

    Add to Reading List

    Source URL: rjoshi.org

    Language: English - Date: 2010-09-11 18:31:43
    46Concurrent computing / Liveness / Temporal logic / Safety property / Category theory / Computation tree logic / Morphism / Dual / Category / Natural transformation / Mathematics / Mathematical logic

    Evolving Specification Engineering Dusko Pavlovic, Peter Pepper, Doug Smith Email: {dusko,smith}@kestrel.edu, Kestrel Institute and Technische Universit¨ at Berlin

    Add to Reading List

    Source URL: www.kestrel.edu

    Language: English - Date: 2012-08-02 20:29:47
    47Cryptography / Radio electronics / Block ciphers / KeeLoq / Rolling code / Data Encryption Standard / ICE

    Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2009-09-22 19:00:54
    48Theoretical computer science / Formal methods / Software engineering / Logic in computer science / Formal verification / Satisfiability modulo theories / Abstract interpretation / Loop invariant / Logic programming / Model checking / KeY / Software verification

    Algorithmic Logic-Based Verification with SeaHorn (Invited Tutorial) Arie Gurfinkel Software Engineering Institute Carnegie Mellon University http://arieg.bitbucket.org

    Add to Reading List

    Source URL: arieg.bitbucket.io

    Language: English - Date: 2018-10-19 18:15:18
    49Psychology / Behavioural sciences / Behavior / Human behavior / Normative ethics / Interpersonal relationships / Community building / Positive psychology / Reciprocity / Gratitude / Social psychology

    A Case Study on the Success of Altruistic Requests Tim Althoff, Cristian Danescu-Niculescu-Mizil, Dan Jurafsky Stanford University & Max Planck Institute SWS What makes a request successful?

    Add to Reading List

    Source URL: www.timalthoff.com

    Language: English - Date: 2014-06-01 19:40:35
    50Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

    Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

    Add to Reading List

    Source URL: zkp.science

    Language: English - Date: 2018-09-15 05:52:51
    UPDATE