Ĝ

Results: 189210



#Item
51Robot / Mobile robot / Artificial intelligence / Technology / Science and technology / Science

SYLLABUS Course title and number Term (e.g., Fall 200X) Meeting times and location CSCEAI Robotics

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2016-11-17 17:53:54
52Cybernetics / Educational psychology / Cognitive science / Technology / Psychology / Artificial intelligence / Computational neuroscience / Intelligence / Artificial Intelligence: A Modern Approach / Machine learning

SYLLABUS Course title and number Term (e.g., Fall 200X) Meeting times and location CSCE 625 AI Robotics

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2017-01-16 16:51:35
53Information and communications technology / Computing / Internet / Internet privacy / Computer networking / File sharing / Transport Layer Security / Network performance / Proxy server / Computer network / Internet censorship circumvention / Transmission Control Protocol

An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

Add to Reading List

Source URL: www.usenix.org

Language: English
54Information and communications technology / Computing / Internet / Internet privacy / Computer networking / File sharing / Transport Layer Security / Network performance / Proxy server / Computer network / Internet censorship circumvention / Transmission Control Protocol

An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
55Machine learning algorithms / Money / Finance / Artificial intelligence / Language acquisition / Richard S. Sutton / Reinforcement learning / Bootstrapping / Andrew Barto / Barto

Multi-step Bootstrapping Jennifer She Reinforcement Learning: An Introduction by Richard S. Sutton and Andrew G. Barto February 7, 2017

Add to Reading List

Source URL: www.cs.ubc.ca

Language: English - Date: 2018-02-06 02:47:52
56

ie,lsh hq;=hs ;ekam;= ys;du;d úlD;s lsÍï" fjkia lsÍï iy ydks lsÍï isÿlrk ,o jHjydr uqo,a fkdaÜgq lsisjla 2018 wfm%a,a ui 01 jeks Èk isg msAdd to Reading List

Source URL: www.hsbc.lk

- Date: 2018-04-20 04:21:38
    57Computing / Webmail / Cybercrime / Software / Fraud / Spamming / Gmail / Phishing / The Spamhaus Project / Identity theft / Yahoo! Mail / Botnet

    What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild Jeremiah Onaolapo, Enrico Mariconti, and Gianluca Stringhini University College London {j.onaolapo, e.mariconti, g.stringhi

    Add to Reading List

    Source URL: jonaolapo.github.io

    Language: English - Date: 2018-10-25 12:11:25
    58

    ´ PARIS 13 - Institut Galil´ UNIVERSITE ee Laboratoire Analyse, G´ eom´ etrie et Applications, UMR 7539

    Add to Reading List

    Source URL: irma.math.unistra.fr

    Language: French - Date: 2010-12-09 19:59:57
      UPDATE