Adam

Results: 10591



#Item
1

Is Interaction Necessary for Distributed Private Learning? Adam Smith∗ , Abhradeep Thakurta† , Jalaj Upadhyay∗ of Electrical Engineering and Computer Science, Pennsylvania State University, Email: {asmith, jalaj}@p

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:45
    2Computational linguistics / Artificial intelligence / Linguistics / Computational science / Question answering / Semantic parsing / Training /  test /  and validation sets / Cyc / Artificial neural network / Reading comprehension / Named-entity recognition / Wikipedia

    Reading Wikipedia to Answer Open-Domain Questions Adam Fisch, Jason Weston & Antoine Bordes Danqi Chen∗ Facebook AI Research Computer Science 770 Broadway

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2017-04-30 21:08:35
    3Computing / Software engineering / Memory management / Computer programming / Pointer / Garbage collection / Heap / C dynamic memory allocation / Region-based memory management / Go / Garbage / Sort

    A Verified Generational Garbage Collector for CakeML Adam Sandberg Ericsson, Magnus O. Myreen, and Johannes ˚ Aman Pohjola Chalmers University of Technology, Sweden

    Add to Reading List

    Source URL: cakeml.org

    Language: English - Date: 2017-07-03 06:09:00
    4Computing / Digital media / Software / Cartography / Geographic data and information / Geography / Geostatistics / Spatial analysis / Twitter / Social media

    Analyzing Global and Pairwise Collective Spatial Attention for Geo-social Event Detection in Microblogs Shoko Wakamiya Adam Jatowt

    Add to Reading List

    Source URL: gdac.uqam.ca

    Language: English - Date: 2017-10-04 00:32:59
    5Order theory / Binary relations / Partially ordered set

    arXiv:1810.05256v1 [cs.DC] 11 OctALEPH: A LEADERLESS, ASYNCHRONOUS, BYZANTINE FAULT TOLERANT CONSENSUS PROTOCOL ´ ADAM GA

    Add to Reading List

    Source URL: arxiv.org

    Language: English - Date: 2018-10-14 21:12:04
    6Linguistics / Phonetics / Phonology / Human communication / Human behavior / Language / Computer accessibility / Speech recognition / Amazon Alexa / Phoneme / Amazon Echo / Alexa

    Skill Squatting Attacks on Amazon Alexa Deepak Kumar Riccardo Paccagnella Paul Murley Eric Hennenfent Joshua Mason Adam Bates Michael Bailey University of Illinois Urbana-Champaign Abstract

    Add to Reading List

    Source URL: kumarde.com

    Language: English - Date: 2018-08-16 10:08:06
    7Computer security / Security engineering / Cyberwarfare / Prevention / Cybercrime / National security / Computer network security / Cyberattack / Capture the flag / Information security / Denial-of-service attack

    Poster: Shell We Play A Game? CTF-as-a-service for Security Education Adam Doup´e and Giovanni Vigna Arizona State University and UC Santa Barbara ,

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-13 00:24:26
    8Economy / Macroeconomics / Innovation / Economic growth / Innovation economics

    This PDF is a selection from an out-of-print volume from the National Bureau of Economic Research Volume Title: Innovation Policy and the Economy, Volume 1 Volume Author/Editor: Adam B. Jaffe, Josh Lerner and Scott Stern

    Add to Reading List

    Source URL: www.nber.org

    Language: English - Date: 2008-12-16 14:45:33
    9Information and communications technology / Computing / Internet / Internet privacy / Computer networking / File sharing / Transport Layer Security / Network performance / Proxy server / Computer network / Internet censorship circumvention / Transmission Control Protocol

    An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    10Information and communications technology / Computing / Internet / Internet privacy / Computer networking / File sharing / Transport Layer Security / Network performance / Proxy server / Computer network / Internet censorship circumvention / Transmission Control Protocol

    An ISP-Scale Deployment of TapDance Sergey Frolov1 , Fred Douglas3 , Will Scott5 , Allison McDonald5 , Benjamin VanderSloot5 , Rod Hynes6 , Adam Kruger6 , Michalis Kallitsis4 , David G. Robinson7 , Steve Schultze2 , Niki

    Add to Reading List

    Source URL: benvds.com

    Language: English - Date: 2018-09-18 11:06:16
    UPDATE