Edu

Results: 1439644



#Item
31Computer architecture / System software / Chroot / Mount / Linux kernel / Procfs / Vmlinux / Booting / SILO / Chrome OS

Getting to Work with OpenPiton Princeton University http://openpiton.org OpenPit

Add to Reading List

Source URL: parallel.princeton.edu

Language: English - Date: 2017-02-16 15:26:30
32Mathematical analysis / Probability theory / Statistical theory / Asymptotic theory / Graph theory / Markov chain / Random variable / Conditional probability distribution / Stochastic processes / Harris chain / Law of large numbers

3 May 1998 ITERATED RANDOM FUNCTIONS Persi Diaconis Department of Mathematics & ORIE Cornell University

Add to Reading List

Source URL: www.stat.berkeley.edu

Language: English - Date: 2009-02-19 12:18:31
33Theoretical computer science / Software engineering / Computing / Formal methods / Logic in computer science / Constraint programming / Electronic design automation / Satisfiability modulo theories / SMT / Solver / Pascal / Semantics

The SMT-LIB Standard Version 2.6 Clark Barrett Pascal Fontaine Release:

Add to Reading List

Source URL: smtlib.cs.uiowa.edu

Language: English - Date: 2017-07-21 16:19:02
34Academia / Interdisciplinarity / Knowledge / Pedagogy / Truth

InterdisciplinaryStudies_BA.pdf

Add to Reading List

Source URL: catalog.southernct.edu

Language: English - Date: 2018-10-06 18:04:54
35

Biology 7-12 "DBEFNJD.BQ  Post-Baccalaureate

Add to Reading List

Source URL: catalog.southernct.edu

Language: English - Date: 2018-10-06 18:05:13
    36Computational neuroscience / Artificial intelligence / Machine learning algorithms / Neuroscience / Applied mathematics / Artificial neural networks / Reinforcement learning / Q-learning / Convolutional neural network / Distributed artificial intelligence / Deep learning / Intelligent agent

    Cooperative Multi-Agent Control Using Deep Reinforcement Learning Jayesh K. Gupta Maxim Egorov

    Add to Reading List

    Source URL: platformlab.stanford.edu

    Language: English - Date: 2017-11-03 18:51:37
    37Computing / Denial-of-service attacks / Cyberwarfare / Cybercrime / Botnets / Computer network security / Denial-of-service attack / Mirai / Internet of things / Low Orbit Ion Cannon / Universal Plug and Play / Computer security

    EECS 388 Intro to Computer Security October 21, 2016 Homework 4: Denial of Service

    Add to Reading List

    Source URL: www.eecs.umich.edu

    Language: English - Date: 2016-11-21 18:50:20
    38Constraint programming / Local consistency / Interleaving / BCD

    ../out/fig-clauses-n100.ps

    Add to Reading List

    Source URL: www.lsi.upc.edu

    Language: English - Date: 2013-07-22 05:26:14
    39

    Proof Procedures for Separated Heap Abstractions Josh Berdine, Cristiano Calcagno, Peter O’Hearn 1 July, 2007 (Canada day) Part 0

    Add to Reading List

    Source URL: www.lsi.upc.edu

    - Date: 2007-07-09 05:41:32
      40Computational neuroscience / Artificial intelligence / Applied mathematics / Artificial neural networks / Neuroscience / Cybernetics / Neural network software / Neural networks / Convolutional neural network / AlexNet / Deep learning / ImageNet

      Deep Neural Networks Predict Category Typicality Ratings for Images Brenden M. Lake Wojciech Zaremba Rob Fergus

      Add to Reading List

      Source URL: cims.nyu.edu

      Language: English - Date: 2015-05-04 15:17:21
      UPDATE