CS

Results: 61295



#Item
31

Overview Representation Synchronization Synthesis

Add to Reading List

Source URL: www.cs.purdue.edu

Language: English - Date: 2016-07-15 23:00:36
    32Computing / Software / Data management / Cross-platform software / High-level programming languages / JavaScript libraries / JavaScript / Web programming / MongoDB / Internet privacy / Data / Subscriber identity module

    Reading sensor data for 4-digit PINs using JavaScript Author: Maryam Mehrnezhad (), Apr 2017 In this help file, we describe the details of our JavaScript code used for reading sensor data (motion an

    Add to Reading List

    Source URL: homepages.cs.ncl.ac.uk

    Language: English - Date: 2017-04-25 15:12:56
    33Central processing unit / Computer architecture / Parallel computing / Computing / Computer engineering / Vector processor / Data parallelism / Vector / Microarchitecture

    Vector Lane Threading S. Rivoire, R. Schultz, T. Okuda, C. Kozyrakis Computer Systems Laboratory Stanford University

    Add to Reading List

    Source URL: rivoire.cs.sonoma.edu

    Language: English - Date: 2017-05-29 18:44:50
    34Machine learning / Learning / Artificial intelligence / Support vector machine / Kernel method / Semi-supervised learning / Sequential minimal optimization / Anomaly detection / Transduction / Outlier / Supervised learning / Binary classification

    Learning with Augmented Class by Exploiting Unlabeled Data

    Add to Reading List

    Source URL: cs.nju.edu.cn

    Language: English - Date: 2016-01-04 03:15:06
    35Theoretical computer science / Formal methods / Logic in computer science / Computing / Software engineering / Electronic engineering / Software testing / Formal verification / Runtime verification / Software verification / Java Modeling Language / Verification

    24 Challenges in Deductive Software Verification∗ Reiner H¨ahnle1 and Marieke Huisman2 1 2 Technische Universit¨

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2017-07-30 15:10:35
    36Logic / Mathematical logic / Mathematics / Propositional calculus / Logical truth / Logic in computer science / Syntax / Automated theorem proving / Resolution / Frege system / Boolean satisfiability problem / First-order logic

    The Potential of Interference-Based Proof Systems Marijn J.H. Heule1 and Benjamin Kiesl2 1 2 Department of Computer Science, The University of Texas at Austin

    Add to Reading List

    Source URL: www.cs.man.ac.uk

    Language: English - Date: 2017-08-02 12:35:21
    37Social information processing / Wikipedia / Digital media / World Wide Web / Collaboration / Academic studies about Wikipedia / Wikipedia community / Justin Knapp / Wiki / Conflict-of-interest editing on Wikipedia / Criticism of Wikipedia

    Using Edit Sessions to Measure Participation in Wikipedia

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2013-02-14 12:23:31
    38Punched card / Computing / Unit record equipment / Tabulating machine / Herman Hollerith / IBM

    “DONot Fold, Spindle or Mutilate”: A Cultural History of the Punch Card Steven Lubar One hundred years have passed since Herman Hollerith invented the punch card to tabulate the 1890census. That’s also, almost exac

    Add to Reading List

    Source URL: www.cs.mun.ca

    Language: English - Date: 2015-02-13 09:25:02
    39Mathematics / Computer programming / Software engineering / Source code / Syntax / Dependency grammar / NC / Term / For loop / Kazhdan's property

    Qlose: Program Repair with Quantitative Objectives? Loris D’Antoni1 , Roopsha Samanta2 , and Rishabh Singh3 1 University of Wisconsin-Madison

    Add to Reading List

    Source URL: www.cs.purdue.edu

    Language: English - Date: 2016-07-15 23:00:36
    40Cryptography / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Padding oracle attack / RSA / Messages / Block cipher mode of operation / ICloud / Authenticated encryption / Symmetric-key algorithm

    Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

    Add to Reading List

    Source URL: www.cs.jhu.edu

    Language: English - Date: 2016-03-22 15:58:42
    UPDATE