Edu

Results: 1439644



#Item
71Controller Synthesis Made Real: Reach-avoid Specifications and Linear Dynamics ? Chuchu Fan1[0000−0003−4671−233X] , Umang Mathur1[0000−0002−7610−0660] , Sayan Mitra1[0000−0001−7082−5516] , and Mahesh Vi

Controller Synthesis Made Real: Reach-avoid Specifications and Linear Dynamics ? Chuchu Fan1[0000−0003−4671−233X] , Umang Mathur1[0000−0002−7610−0660] , Sayan Mitra1[0000−0001−7082−5516] , and Mahesh Vi

Add to Reading List

Source URL: mitras.ece.illinois.edu

Language: English - Date: 2018-07-11 16:52:43
72Description Logics  ILCS 2007 Introduction to Logic in Computer Science: Autumn 2007

Description Logics ILCS 2007 Introduction to Logic in Computer Science: Autumn 2007

Add to Reading List

Source URL: formal.iti.kit.edu

Language: English - Date: 2016-07-22 17:55:15
73Published as a conference paper at ICLRM AKING N EURAL P ROGRAMMING A RCHITECTURES G ENERALIZE VIA R ECURSION Jonathon Cai, Richard Shin, Dawn Song Department of Computer Science

Published as a conference paper at ICLRM AKING N EURAL P ROGRAMMING A RCHITECTURES G ENERALIZE VIA R ECURSION Jonathon Cai, Richard Shin, Dawn Song Department of Computer Science

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2017-03-10 19:56:16
74Learning gem5 – Part II Modifying and Extending gem5 Jason Lowe-Power http://learning.gem5.org/ https://faculty.engineering.ucdavis.edu/lowepower/

Learning gem5 – Part II Modifying and Extending gem5 Jason Lowe-Power http://learning.gem5.org/ https://faculty.engineering.ucdavis.edu/lowepower/

Add to Reading List

Source URL: learning.gem5.org

Language: English - Date: 2018-09-17 11:50:25
75Calculemus Igitur Lambert Meertens Kestrel Institute & Utrecht University (1)

Calculemus Igitur Lambert Meertens Kestrel Institute & Utrecht University (1)

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2012-08-03 13:20:36
76Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai

Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval Ishai

Add to Reading List

Source URL: web.eecs.umich.edu

Language: English - Date: 2014-03-20 23:52:12
77M I S S I S S I P P I ’ S BU S I N E S S Monitoring the state’s economy DECEMBER 2017 VOLUME 75, NUMBER 12

M I S S I S S I P P I ’ S BU S I N E S S Monitoring the state’s economy DECEMBER 2017 VOLUME 75, NUMBER 12

Add to Reading List

Source URL: www.mississippi.edu

Language: English - Date: 2017-12-07 10:22:31
    78Formale Systeme II: Theorie  SS 2016 Prof. Dr. Bernhard Beckert · Dr. Mattias Ulbrich Slides by courtesy of Andr´e Platzer, CMU

    Formale Systeme II: Theorie SS 2016 Prof. Dr. Bernhard Beckert · Dr. Mattias Ulbrich Slides by courtesy of Andr´e Platzer, CMU

    Add to Reading List

    Source URL: formal.iti.kit.edu

    Language: English - Date: 2016-06-13 15:35:57
      79Velocity-based Storage and Stowage Decisions in a Semiautomated Fulfillment System by Rong Yuan Submitted to the Sloan School of Management on July 19, 2016 in partial fulfillment of the requirements for the degree of Do

      Velocity-based Storage and Stowage Decisions in a Semiautomated Fulfillment System by Rong Yuan Submitted to the Sloan School of Management on July 19, 2016 in partial fulfillment of the requirements for the degree of Do

      Add to Reading List

      Source URL: web.mit.edu

      Language: English - Date: 2017-03-02 13:15:10
      80Operator Counting Heuristics for Probabilistic Planning Felipe Trevizan, Sylvie Thi´ebaux, Patrik Haslum Data61, CSIRO and Research School of Computer Science, Australian National University   Abstr

      Operator Counting Heuristics for Probabilistic Planning Felipe Trevizan, Sylvie Thi´ebaux, Patrik Haslum Data61, CSIRO and Research School of Computer Science, Australian National University Abstr

      Add to Reading List

      Source URL: users.cecs.anu.edu.au

      Language: English - Date: 2018-07-07 12:35:35