Computing

Results: 372271



#Item
101Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

Practical Post-Quantum Cryptography for Trusted Computing Matthias J. Kannwischer, PhD Student Workshop on Trusted Computing and its Applications 25 January 2018

Add to Reading List

Source URL: kannwischer.eu

Language: English - Date: 2018-04-02 10:21:47
102arXiv:1803.04432v1 [cs.DC] 12 MarMemory Models for C/C++ Programmers Manuel P¨oter Jesper Larsson Tr¨aff Research Group Parallel Computing

arXiv:1803.04432v1 [cs.DC] 12 MarMemory Models for C/C++ Programmers Manuel P¨oter Jesper Larsson Tr¨aff Research Group Parallel Computing

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2018-03-13 20:30:42
103SymPy: symbolic computing in Python Aaron Meurer1 , Christopher P. Smith2 , Mateusz Paprocki3 , Ondřej Čertík4 , Sergey B. Kirpichev5 , Matthew Rocklin3 , AMiT Kumar6 , Sergiu Ivanov7 , Jason K. Moore8 , Sartaj Singh9

SymPy: symbolic computing in Python Aaron Meurer1 , Christopher P. Smith2 , Mateusz Paprocki3 , Ondřej Čertík4 , Sergey B. Kirpichev5 , Matthew Rocklin3 , AMiT Kumar6 , Sergiu Ivanov7 , Jason K. Moore8 , Sartaj Singh9

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2017-01-05 08:28:20
104Learning-Based Abstractions for Nonlinear Constraint Solving Sumanth Dathathri ∗1 , Nikos Arechiga2 , Sicun Gao3 , and Richard M. Murray1 1 Computing and Mathematical Sciences, California Institute of Technology 2

Learning-Based Abstractions for Nonlinear Constraint Solving Sumanth Dathathri ∗1 , Nikos Arechiga2 , Sicun Gao3 , and Richard M. Murray1 1 Computing and Mathematical Sciences, California Institute of Technology 2

Add to Reading List

Source URL: scungao.github.io

Language: English - Date: 2018-09-27 16:37:21
105Computing minimal interpolation bases

Computing minimal interpolation bases

Add to Reading List

Source URL: perso.ens-lyon.fr

Language: English - Date: 2017-06-27 04:39:37
106EDGE COMPUTING FOR THE INTERNET OF THINGS  Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things Shichao Li, Ning Zhang, Siyu Lin, Linghe Kong, Ajay Katangur, Muhammad Khurram Khan, Min

EDGE COMPUTING FOR THE INTERNET OF THINGS Joint Admission Control and Resource Allocation in Edge Computing for Internet of Things Shichao Li, Ning Zhang, Siyu Lin, Linghe Kong, Ajay Katangur, Muhammad Khurram Khan, Min

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2018-08-22 21:38:24
107Distributed Computing Prof. R. Wattenhofer Automatic Music Generation with Deep Learning In this thesis we want to come up with new methods for automatic music generation based

Distributed Computing Prof. R. Wattenhofer Automatic Music Generation with Deep Learning In this thesis we want to come up with new methods for automatic music generation based

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2018-08-14 07:40:17
108An Operational Semantics for JavaScript? Sergio Maffeis1 , John C. Mitchell2 , Ankur Taly2 , 1 2  Department of Computing, Imperial College London

An Operational Semantics for JavaScript? Sergio Maffeis1 , John C. Mitchell2 , Ankur Taly2 , 1 2 Department of Computing, Imperial College London

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
109Computing and Estimating Information Leakage with a Quantitative Point-to-Point Information Flow Model by

Computing and Estimating Information Leakage with a Quantitative Point-to-Point Information Flow Model by

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2017-06-07 20:45:26