Edu

Results: 1439644



#Item
541Mathematics / Computational complexity theory / Applied mathematics / Algorithm / Mathematical logic / Theoretical computer science / Mathematical optimization / Linear programming / Shortest path problem / Ant colony optimization algorithms / Genetic algorithm

Capacity Planning in a General Supply Chain with Multiple Contract Types by Xin Huang Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2018-07-20 12:49:56
542

Woodruff Library Master Schedule Summer 2018 Winter IntersessionDec 20, Jan 14, 2019

Add to Reading List

Source URL: web.library.emory.edu

- Date: 2018-10-26 00:12:21
    543Computational neuroscience / Artificial neural networks / Applied mathematics / Computing / Cybernetics / Deep learning / Recurrent neural network / Training /  test /  and validation sets / Artificial intelligence / Abstraction layer / Neural network

    Rearranging the Familiar: Testing Compositional Generalization in Recurrent Networks arXiv:1807.07545v1 [cs.CL] 19 JulJo˜ao Loula

    Add to Reading List

    Source URL: cims.nyu.edu

    Language: English - Date: 2018-07-20 17:31:26
    544Carnegie Mellon University / Carnegie Mellon Silicon Valley / Information Networking Institute / Carnegie Mellon School of Computer Science

    Electrical & Computer EngineeringM.S. Catalog/Handbook ECE Office of Graduate Affairs This document is for the internal use of the Department of Electrical and Computer Engineering

    Add to Reading List

    Source URL: www.ece.cmu.edu

    Language: English - Date: 2018-10-24 08:39:16
    545Human behavior / Internet manipulation and propaganda / Internet trolling / Deception / Sockpuppet / World Wide Web / Internet culture / Internet troll / Trolling / Troll

    Malicious Behavior on the Web: Characterization and Detection Srijan Kumar (@srijankr) Justin Cheng (@jcccf) Jure Leskovec (@jure) Slides are available at http://snap.stanford.edu/www2017tutorial/

    Add to Reading List

    Source URL: snap.stanford.edu

    Language: English - Date: 2017-04-03 00:44:44
    546Parallel computing / Computing / Computer programming / Software engineering / Data parallelism / Proteus / Implicit parallelism / Software prototyping / Concurrent computing / Message Passing Interface / SIMD / Refinement

    dunck.doc.6 Chapter 5: The Proteus System for the Development of Parallel Applications 143

    Add to Reading List

    Source URL: www.kestrel.edu

    Language: English - Date: 2012-08-08 19:03:01
    547Wireless networking / Technology / Wireless / Emerging technologies / Mobile technology / Vehicle telematics / Internet of things / IEEE 802 / 5G / IEEE 802.11p / Vehicular communication systems / IEEE 802.15

    Impact of Next-Generation Mobile Technologies on IoT — Cloud Convergence Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges Linghe Kong, Muhammad Khur

    Add to Reading List

    Source URL: wirelesslab.sjtu.edu.cn

    Language: English - Date: 2017-12-01 00:35:37
    548Computing / Concurrent computing / Apache Software Foundation / Parallel computing / Input/output / Scheduling / Data management / Apache Hadoop / Data-intensive computing / Benchmark / Apache Spark / MapReduce

    Making Sense of Performance in Data Analytics Frameworks Kay Ousterhout∗ , Ryan Rasti∗† , Sylvia Ratnasamy∗ , Scott Shenker∗† , Byung-Gon Chun‡ ∗ UC Berkeley, † ICSI,  VMware, ‡ Seoul National Unive

    Add to Reading List

    Source URL: people.eecs.berkeley.edu

    Language: English - Date: 2015-03-04 02:04:39
    549Abstract algebra / Algebra / Mathematics / Group theory / Computational hardness assumptions / Logarithms / Modular arithmetic / Finite fields / Discrete logarithm / Randomized algorithm / Pollard's rho algorithm / Index calculus algorithm

    On the Efficiency of Pollard’s Rho Method for Discrete Logarithms Shi Bai1 1 2

    Add to Reading List

    Source URL: maths-people.anu.edu.au

    Language: English - Date: 2007-10-10 03:07:41
    550Cryptography / Computational complexity theory / Complexity classes / NP-complete problems / NP / IP / Proof of secure erasure / Certificate / Circuit satisfiability problem / Commitment scheme / Witness / Proof of knowledge

    COSC 544 Probabilistic Proof SystemsTurning Computer Programs Into Circuits (Part 2) Lecturer: Justin Thaler

    Add to Reading List

    Source URL: people.cs.georgetown.edu

    Language: English - Date: 2017-10-06 17:06:30
    UPDATE