J.

Results: 175847



#Item
161Mathematics / Computational neuroscience / Machine learning / Applied mathematics / Artificial neural networks / Feature learning / Deep learning / Outline of machine learning / Mutual information / Embedding / Neural network

Author2Vec: Learning Author Representations by Combining Content and Link Information Ganesh J1 Soumyajit Ganguly1 Manish Gupta1,2 Vasudeva Varma1 Vikram Pudi1 1 IIIT, Hyderabad, India, {ganesh.j, soumyajit.ganguly}@res

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:42:53
162

Grivaux, Julien Parabolic automorphisms of projective surfaces (after M. H. Gizatullin). (English) Zbl  Mosc. Math. J. 16, No. 2, Summary: In [Izv. Akad. Nauk SSSR, Ser. Mat. 44, 110–144 (

Add to Reading List

Source URL: jgrivaux.perso.math.cnrs.fr

- Date: 2018-03-18 09:06:00
    163Backup software / System software / Utility software / Computing / Backup / Incremental backup / Andrew File System / File system / Remote backup service / Veeam Backup & Replication

    Considerations when Choosing a Backup System for AFS® By Kristen J. Webb President and CTO Teradactyl LLC. October 21, 2005 The Andrew File System® has a proven track record as a scalable and secure network file system

    Add to Reading List

    Source URL: www.teradactyl.com

    Language: English
    164Cryptography / Public-key cryptography / Post-quantum cryptography / Hash-based cryptography / Hashing / Merkle signature scheme / Digital signature / Merkle tree / Cryptographic hash function / RSA / Hash function / Quantum digital signature

    Practical Fault Injection Attacks on SPHINCS Aymeric Genêt1,2 , Matthias J. Kannwischer3 , Hervé Pelletier2 , and Andrew McLauchlan2 ? 1 3

    Add to Reading List

    Source URL: kannwischer.eu

    Language: English - Date: 2018-07-10 06:41:12
    165Computing / Software quality / Engineering / Reliability engineering / Software engineering / Design for X / Materials science / Survival analysis / Fault tolerance / Redundancy / Software design / Modular programming

    Reliable Software Systems Design: Defect Prevention, Detection, and Containment Gerard J. Holzmann Rajeev Joshi Laboratory for Reliable Software NASA/JPL Pasadena, CA 91109, USA

    Add to Reading List

    Source URL: rjoshi.org

    Language: English - Date: 2010-09-11 18:33:49
    166Health / Food and Drug Administration / Tobacco / Smoking / Electronic cigarettes / Tobacco control / Smoking cessation / Food law / Center for Tobacco Products / Federal Food /  Drug /  and Cosmetic Act / Cigarette / Premarket tobacco application

    September 12, 2018 Fontem Ventures 1100 South Tryon Street Suite 350 Charlotte, N.CDear Mr. J. Christopher Prue:

    Add to Reading List

    Source URL: www.fda.gov

    Language: English
    167

    Grivaux, Julien  Formality of derived intersections. (English) Zbl  Doc. Math., J. DMV 19, ). Summary: We study derived intersections of smooth analytic cycles, and provide in some cases nece

    Add to Reading List

    Source URL: jgrivaux.perso.math.cnrs.fr

    - Date: 2018-03-18 08:56:30
      168Technology / Culture / Information and communications technology / Cultural globalization / Digital technology / Broadband / Community building / Digital media / Internet access / Social capital / Digital divide / Internet

      Rural Community Participation, Social Networks, and Broadband Use: Examples from Localized and National Survey Data Michael J. Stern, Alison E. Adams, and Jeffrey Boase Although attention has been given to how broadband

      Add to Reading List

      Source URL: individual.utoronto.ca

      Language: English - Date: 2017-09-21 13:37:58
      169Software engineering / Computing / Computer programming / Array data type / Array data structure / D

      Weakly Equivalent Arrays J¨ urgen Christ Jochen Hoenicke

      Add to Reading List

      Source URL: smt2014.it.uu.se

      Language: English - Date: 2014-07-19 03:23:04
      170Software engineering / Computer programming / Theoretical computer science / Automated theorem proving / Lisp / ACL2 / Formal methods / Logic in computer science / Robert S. Boyer

      Industrial Use of ACL2: Applications, Achievements, Challenges, and Directions J Strother Moore and Marijn J.H. Heule Department of Computer Science The University of Texas at Austin {moore,marijn}@cs.utexas.edu

      Add to Reading List

      Source URL: www.cs.man.ac.uk

      Language: English - Date: 2017-07-30 15:10:42
      UPDATE