Computer University

Results: 29298



#Item
51Mathematical analysis / Probability and statistics / Probability theory / Machine learning / Computational neuroscience / Computational statistics / Artificial neural networks / Bayesian statistics / Gaussian function / Mixture model / Mixture distribution / Joint probability distribution

Mixture Density Networks Christopher M. Bishop Neural Computing Research Group Dept. of Computer Science and Applied Mathematics Aston University

Add to Reading List

Source URL: publications.aston.ac.uk

Language: English - Date: 2017-02-05 19:13:20
52Linear temporal logic / Temporal logic / Symbol / FO / Differential topology / operator

Pareto Curves for Probabilistic Model Checking Vojtˇech Forejt1 , Marta Kwiatkowska1 , and David Parker2 1 2 Department of Computer Science, University of Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2012-06-29 07:04:13
53Algebra / Mathematics / Computational linguistics / Linear algebra / Natural language processing / Artificial neural networks / Machine learning / Word2vec / Word embedding / Latent semantic analysis / Vector space model / GloVe

GloVe: Global Vectors for Word Representation Jeffrey Pennington, Richard Socher, Christopher D. Manning Computer Science Department, Stanford University, Stanford, CA 94305 , , mann

Add to Reading List

Source URL: nlp.stanford.edu

Language: English - Date: 2018-04-09 22:53:03
54Mathematics / Group theory / Graph theory / Markov chain / Kazhdan's property / Stochastic game / Markov decision process / Distribution / -quadratic form

Strategy Synthesis for Stochastic Games with Multiple Long-Run Objectives Nicolas Basset∗ , Marta Kwiatkowska∗ , Ufuk Topcu† , and Clemens Wiltsche∗ ∗ Department of Computer Science, University of Oxford, Unite

Add to Reading List

Source URL: www.prismmodelchecker.org

Language: English - Date: 2015-04-15 12:27:37
55Theoretical computer science / Computer science / Formal methods / Computing / Logic in computer science / European Joint Conferences on Theory and Practice of Software / Computer Aided Verification / Software verification / Formal verification / Edmund M. Clarke / Satisfiability modulo theories / Verification

Arie Gurfinkel Department of Electrical and Computer Engineering University of Waterloo 200 University Ave. W., Waterloo, ON, N2L 3G1 Canada

Add to Reading List

Source URL: arieg.bitbucket.io

Language: English - Date: 2018-10-19 18:15:18
56Search algorithms / Game artificial intelligence / Combinatorial optimization / Mathematics / Information science / Information retrieval / Artificial intelligence / Routing algorithms / Automated planning and scheduling / A* search algorithm / Heuristic / Incremental heuristic search

Planning with Concurrent Execution Bence Cserna Department of Computer Science University of New Hampshire Durham, NHUSA

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-09 08:09:24
57Concurrency control / Computing / Edsger W. Dijkstra / Concurrent computing / Computer programming / Concurrency / Transaction processing / Synchronization / Lock / Monitor / Parallel computing / Granularity

An Algorithmic Framework for Synthesis of Concurrent Programs E. Allen Emerson and Roopsha Samanta Dept. of Computer Science and Computer Engineering Research Centre, University of Texas, Austin, TX 78712, USA. {emerson,

Add to Reading List

Source URL: www.cs.purdue.edu

Language: English - Date: 2016-07-15 23:00:36
58Cryptography / Mathematics / Polynomials / Multivariate cryptography / Algebra / Pseudorandom number generator / Computer algebra / Hidden Field Equations / QUAD / Field extension / Cryptographically secure pseudorandom number generator / Mersenne Twister

Secure PRNGs from Specialized Polynomial Maps over Any Fq Feng-Hao Liu1 , Chi-Jen Lu2 , and Bo-Yin Yang2 1 Department of Computer Science, Brown University, Providence RI, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2012-03-10 01:26:44
59Computer architecture / System software / Operating system kernels / Linux kernel / Monolithic kernels / Kernel / Loadable kernel module / Protection ring / Operating system / Mach / Rootkit / Mandatory access control

Poster: (SF)2 I - Structure Field Software Fault Isolation Spyridoula Gravani, Zhuojia Shen, John Criswell Department of Computer Science, University of Rochester Email: {sgravani, zshen10, criswell}@cs.rochester.edu Ab

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-14 06:12:20
60BitTorrent / Peer-to-peer file sharing / File sharing / Computing / Comparison of BitTorrent clients / Torrent file / The Pirate Bay / Copyright infringement / Peer-to-peer / Peer exchange / Torrent poisoning

The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent Tom Chothia, Marco Cova, Chris Novakovic, and Camilo Gonz´alez Toro School of Computer Science, University of Birmingham, UK Abstract. It is known

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26
UPDATE