Department of Computer Science

Results: 12626



#Item
21Logic / Mathematical logic / Non-classical logic / Markov logic network / Software testing / Probabilistic logic / Software bug / Code coverage / Debugging / Inference / First-order logic / Buggy

Software Bug Localization with Markov Logic Sai Zhang Congle Zhang Department of Computer Science & Engineering

Add to Reading List

Source URL: zhang-sai.github.io

Language: English - Date: 2015-05-05 00:58:34
22Mathematics / Mathematical analysis / Temporal logic / Computation tree logic / Logic in computer science / Distribution / Symbol / Constructible universe / Linear temporal logic / Craig interpolation

Automatic Verification of Competitive Stochastic Systems Taolue Chen, Vojtˇech Forejt, Marta Kwiatkowska, David Parker, and Aistis Simaitis Department of Computer Science, University of Oxford, Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2012-01-06 05:40:55
23Software engineering / Computer programming / Computing / Interpolation / Video / Video signal / Craig interpolation / Pure / Foreach loop

Efficient Interpolation for the Theory of Arrays (work in progress) Jochen Hoenicke and Tanja Schindler∗ Department of Computer Science, University of Freiburg

Add to Reading List

Source URL: smt-workshop.cs.uiowa.edu

Language: English - Date: 2017-09-02 14:08:49
24Applied mathematics / Cognition / Cybernetics / Learning / Machine learning / Artificial neural network / Analysis / Algorithm / Mathematics

Learning a Static Analyzer from Data Pavol Bielik, Veselin Raychev, and Martin Vechev Department of Computer Science, ETH Z¨ urich, Switzerland {pavol.bielik, veselin.raychev, martin.vechev}@inf.ethz.ch

Add to Reading List

Source URL: files.sri.inf.ethz.ch

Language: English - Date: 2018-09-05 10:55:58
25Genetic algorithms / Evolutionary algorithms / Artificial intelligence / Applied mathematics / Cybernetics / Mathematical optimization / Mathematics / Genetic programming / Algorithm / Crossover

Stochastic Hillclimbing as a Baseline Method for Evaluating Genetic Algorithms Ari Juels Department of Computer Science

Add to Reading List

Source URL: pdfs.semanticscholar.org

Language: English - Date: 2017-03-10 11:15:03
26Finite automata / Temporal logic / Automated planning and scheduling / Linear temporal logic / Theoretical computer science / Neuropsychology / Computational complexity theory / Model checking / Deterministic finite automaton / Finite-state machine / Nondeterministic finite automaton / Algorithm

Planning Under Uncertainty with Temporally Extended Goals Alberto Camacho ∗ Department of Computer Science University of Toronto. Canada.

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-16 07:11:20
27Cryptography / Computing / Internet / Internet Standards / Internet protocols / Cryptographic protocols / E-commerce / Public-key cryptography / Transport Layer Security / Hostname / X.509 / Public key certificate

HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:58:27
28Formal languages / Mathematics / Theoretical computer science / Models of computation / Discrete mathematics / Nested word / Words / Bisimulation / Distribution / Deterministic pushdown automaton

Bisimilarity of Probabilistic Pushdown Automata Vojtěch Forejt1 , Petr Jančar2 , Stefan Kiefer1 , and James Worrell1 1 2 Department of Computer Science, University of Oxford, UK

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2013-12-01 10:21:43
29Cryptography / Elliptic curve cryptography / EdDSA / Elliptic-curve cryptography / Elliptic Curve Digital Signature Algorithm / Curve25519 / Elliptic-curve DiffieHellman / Digital signature / Digital Signature Algorithm / Daniel J. Bernstein / Hash function / Public-key cryptography

High-speed high-security signatures Daniel J. Bernstein1 , Niels Duif2 , Tanja Lange2 , Peter Schwabe3 , and Bo-Yin Yang4 1 Department of Computer Science University of Illinois at Chicago, Chicago, IL 60607–7045, USA

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-07-09 00:19:47
30Computer network security / Computing / Firewall software / Information and communications technology / Computer security / Data security / Internet censorship in China / Human rights in China / Firewall / Stateful firewall / Internet censorship / Router

Internet Censorship in China: Where Does the Filtering Occur? Xueyang Xu, Z. Morley Mao, and J. Alex Halderman Department of Computer Science and Engineering, University of Michigan, 2260 Hayward Street, Ann Arbor, MI 48

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2011-03-10 12:58:06
UPDATE