University of Virginia

Results: 8110



#Item
91

Deep Learning for Character-based Information Extraction Yanjun Qi (University of Virginia, USA) Sujatha Das G (Penn. State University, USA) Ronan Collobert (IDIAP) Jason Weston (Google Research NY)

Add to Reading List

Source URL: www.cs.cmu.edu

- Date: 2014-05-11 00:10:19
    92

    Poster: Evading Web Malware Classifiers using Genetic Programming Anant Kharkar University of Virginia

    Add to Reading List

    Source URL: www.ieee-security.org

    - Date: 2016-05-18 07:17:44
      93

      West Virginia University’s Vision for the Beckley Campus and WVU Tech Executive Summary West Virginia University (“WVU” or the “University”) has spent nearly a year assessing the viability of the former

      Add to Reading List

      Source URL: wvutoday.assets.slate.wvu.edu

      - Date: 2015-10-19 10:28:08
        94

        Spanning Trees in Hypergraphs with Applications to Steiner Trees A Dissertation Presented to the Faculty of the School of Engineering and Applied Science University of Virginia In Partial Ful llment of the Requirements f

        Add to Reading List

        Source URL: www.warme.net

        - Date: 2015-09-28 18:26:01
          95

          VCU notice of nondiscrimination, equal opportunity and affirmative action Virginia Commonwealth University does not discriminate in admissions, treatment, employment or access to its programs or activities on the basis o

          Add to Reading List

          Source URL: www.vcu.edu

          - Date: 2016-01-15 13:09:12
            96

            Lightweight version of π-Cipher Hristina Mihajloska, Mohamed El Hadedy, Danilo Gligoroski and Kevin Skadron Department of Computer Science University of Virginia

            Add to Reading List

            Source URL: csrc.nist.gov

            - Date: 2015-07-20 09:29:07
              97

              Deed of Gift To The University of Virginia Click here to enter donor name/donor entity Of Click here to enter donor address hereby offers to give, transfer, and deliver all of my right, title and interest in and to

              Add to Reading List

              Source URL: www3.alumni.virginia.edu

              - Date: 2016-04-01 16:59:11
                98

                Worst-Case Execution Time Analysis of Security Policies for Deeply Embedded Real-Time Systems Sibin Mohan Dept. of Computer Science, North Carolina State University, Raleigh, NCAbstract

                Add to Reading List

                Source URL: www.cs.virginia.edu

                - Date: 2008-02-18 18:05:28
                  99

                  AIMS Born-Digital Collections: An Inter-Institutional Model for Stewardship January 2012 University of Hull Stanford University

                  Add to Reading List

                  Source URL: dcs.library.virginia.edu

                  - Date: 2015-02-16 14:11:40
                    100

                    CCured: Type-Safe Retrofitting of Legacy Software GEORGE C. NECULA, JEREMY CONDIT, MATTHEW HARREN, SCOTT McPEAK, and WESTLEY WEIMER University of California, Berkeley

                    Add to Reading List

                    Source URL: www.cs.virginia.edu

                    - Date: 2008-02-27 16:12:44
                      UPDATE