111![Advances and Challenges of Quantitative Verification and Synthesis for Cyber-Physical Systems Marta Kwiatkowska Department of Computer Science, University of Oxford, UK Abstract—We are witnessing a huge growth of cyber Advances and Challenges of Quantitative Verification and Synthesis for Cyber-Physical Systems Marta Kwiatkowska Department of Computer Science, University of Oxford, UK Abstract—We are witnessing a huge growth of cyber](https://www.pdfsearch.io/img/9e7da2b0a23dfef68e17fe58535a1d0a.jpg) | Add to Reading ListSource URL: qav.comlab.ox.ac.ukLanguage: English - Date: 2016-09-02 06:46:32
|
---|
112![Ritwika Ghosh phone : (+email : Profile : I am a first year graduate student in Computer Science at the University of Illinois, Urbana-Champaign, interested in formal methods, and appl Ritwika Ghosh phone : (+email : Profile : I am a first year graduate student in Computer Science at the University of Illinois, Urbana-Champaign, interested in formal methods, and appl](https://www.pdfsearch.io/img/8bac925884c1d33787b74254db8819f9.jpg) | Add to Reading ListSource URL: web.engr.illinois.eduLanguage: English - Date: 2014-02-28 12:52:15
|
---|
113![Compositional Strategy Synthesis for Stochastic Games with Multiple Objectives N. Basseta , M. Kwiatkowskaa,⇤, C. Wiltschea a Department of Computer Science, University of Oxford, United Kingdom Compositional Strategy Synthesis for Stochastic Games with Multiple Objectives N. Basseta , M. Kwiatkowskaa,⇤, C. Wiltschea a Department of Computer Science, University of Oxford, United Kingdom](https://www.pdfsearch.io/img/cd648b27e5cfa292a6e13449c8855272.jpg) | Add to Reading ListSource URL: www.prismmodelchecker.orgLanguage: English - Date: 2017-06-28 16:10:52
|
---|
114![Mathematics of Machine Learning: An introduction Sanjeev Arora Princeton University Computer Science Institute for Advanced Study Mathematics of Machine Learning: An introduction Sanjeev Arora Princeton University Computer Science Institute for Advanced Study](https://www.pdfsearch.io/img/1f8c6dbda12db241bb5f75261b492050.jpg) | Add to Reading ListSource URL: eta.impa.brLanguage: English - Date: 2018-07-28 17:09:48
|
---|
115![SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science](https://www.pdfsearch.io/img/dc7719353510cfef3b16df5e96407494.jpg) | Add to Reading ListSource URL: crysp.uwaterloo.caLanguage: English - Date: 2018-08-13 15:14:33
|
---|
116![Published as a conference paper at ICLRP ROGRAM S YNTHESIS FOR C HARACTER L EVEL L ANGUAGE M ODELING Pavol Bielik, Veselin Raychev & Martin Vechev Department of Computer Science, ETH Z¨urich, Switzerland Published as a conference paper at ICLRP ROGRAM S YNTHESIS FOR C HARACTER L EVEL L ANGUAGE M ODELING Pavol Bielik, Veselin Raychev & Martin Vechev Department of Computer Science, ETH Z¨urich, Switzerland](https://www.pdfsearch.io/img/7b819175ef2738fcb60bdc39f999f2d1.jpg) | Add to Reading ListSource URL: files.sri.inf.ethz.chLanguage: English - Date: 2018-09-05 10:55:59
|
---|
117![Smoothness Testing of Polynomials over Finite Fields Jean-Franc ¸ ois Biasse and Michael J. Jacobson Jr. Department of Computer Science, University of Calgary 2500 University Drive NW Smoothness Testing of Polynomials over Finite Fields Jean-Franc ¸ ois Biasse and Michael J. Jacobson Jr. Department of Computer Science, University of Calgary 2500 University Drive NW](https://www.pdfsearch.io/img/28150810cacc4d15857f96c40d1ea718.jpg) | Add to Reading ListSource URL: www.lix.polytechnique.frLanguage: English - Date: 2016-05-19 17:03:48
|
---|
118![A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m](https://www.pdfsearch.io/img/ed485874de2170dcfc6ab466e7e4d42e.jpg) | Add to Reading ListSource URL: www.cs.bham.ac.ukLanguage: English - Date: 2017-06-07 20:45:26
|
---|
119![Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri Poster: Can Johnny Authenticate? Elham Vaziripour, Ray Clinton, Justin Wu, Mark O’Neill, Jordan Whitehead, Scott Heidbrink, Kent Seamons, Daniel Zappala Computer Science Department, Brigham Young University elhamvaziri](https://www.pdfsearch.io/img/d0072a041069c5ad95d8fb08b63e928d.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-15 03:43:28
|
---|
120![Under review as a conference paper at ICLRM ETA L EARNING S HARED H IERARCHIES Jonathan Ho, Xi Chen, Pieter Abbeel UC Berkeley, Department of Electrical Engineering and Computer Science Under review as a conference paper at ICLRM ETA L EARNING S HARED H IERARCHIES Jonathan Ho, Xi Chen, Pieter Abbeel UC Berkeley, Department of Electrical Engineering and Computer Science](https://www.pdfsearch.io/img/c06cfc6f0613e7b5e9392aac4b393f8c.jpg) | Add to Reading ListSource URL: arxiv.orgLanguage: English - Date: 2017-10-26 20:31:00
|
---|