IS-IS

Results: 915390



#Item
411Computational linguistics / Linguistics / Natural language processing / Applied linguistics / Semantics / Computational science / Artificial neural networks / Speech recognition / Sentiment analysis / SemEval / Word embedding / Word-sense disambiguation

Inducing Domain-Specific Sentiment Lexicons from Unlabeled Corpora Abstract A word’s sentiment depends on the domain in which it is used. Computational social science research thus requires sentiment lexicons that

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2016-09-26 20:29:55
412Wyoming Business Council / Wyoming / Funding / Kickstart / United States

Chapter 1 Kickstart:Wyoming Program Section 1. Authority. The Wyoming Business Council, pursuant to Wyoming Statute § c), is required to promulgate such rules as are necessary to administer a “kickstart:Wyomi

Add to Reading List

Source URL: wyomingbusiness.org

Language: English - Date: 2018-09-24 19:01:30
413Quantum information science / Theoretical computer science / Quantum mechanics / Quantum cryptography / Cryptography / Quantum computing / BB84 / Qubit / Quantum key distribution / Quantum information / Controlled NOT gate / Quantum money

Lecture 8, Thurs Feb 9: More on Quantum Money, BB84 QKD Guest Lecture by Supartha Podder Continuation of Quantum Money Last time we discussed how classical money is copyable and described a scheme for making money uncopy

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-08-26 18:22:42
414Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Malleability / Message authentication code / Paillier cryptosystem / RSA / Digital signature

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2017-02-03 04:27:06
415Academic publishing / Knowledge / Publishing / Human behavior / Intellectual property law / Grey literature / Manuscript / Writing / Electronic submission / Copyright / Book

River Publishers Guidelines for Authors Submitting a Journal Paper Preparing your manuscript Please use these guidelines to ensure that your manuscript is complete prior to submission of your article.

Add to Reading List

Source URL: www.riverpublishers.com

Language: English - Date: 2017-08-09 03:35:36
416

John Rose, Ogden Newspapers / Courtesy of AAEC Draw your own conclusions Study the drawing and add a caption to this wordless cartoon. There is no wrong answer, so just be creative!

Add to Reading List

Source URL: nieonline.com

- Date: 2018-05-20 09:23:10
    417Economy / Finance / Money / Investment management / Management fee / Fund administration / Foreign exchange market / Performance fee / Assets under management / Interest / International Financial Reporting Standards

    FUND ADMINISTRATION SERVICES QUESTIONNAIRE SGGG Fexserv Fund Services (Malta) Limited is committed to ensuring that each client receives a consistently superior level of service. The completion of the following questionn

    Add to Reading List

    Source URL: sgggfexserv.com

    Language: English - Date: 2016-12-07 11:25:00
    418Software / Computing / IOS / Tablet computers / Computer architecture / Video software / GPS navigation devices / ITunes / Rylo / IPhoto / Instagram / Hyperlapse

    Rylo Executive Team Alex Karpenko, CEO and Co-Founder Alex Karpenko is the co-founder and CEO of Rylo. He studied computational photography and machine learning at Stanford and dropped out of his PhD program to found Lum

    Add to Reading List

    Source URL: www.rylo.com

    Language: English - Date: 2018-10-03 16:53:51
    419Food and drink / Cuisine / Staple foods / World cuisine / Mediterranean cuisine / Vegan cuisine / Yogurt / Bread / Pasta / Paste / Soy milk / Table of food nutrients

    List of Acid/Alkali Forming Foods Here is a brief food table based on the information provided by Professor Jürgen Vormanne of the Institute for Prevention and Diet in Ismaning, Germany. Foods with a negative value exer

    Add to Reading List

    Source URL: alkaway.com

    Language: English - Date: 2017-12-05 00:34:58
    420Computing / Computer security / Internet security / Information Age / Information and communications technology / HackerOne / Computer viruses / Bug bounty program / Hacker culture / Security hacker / Hacker / Katie Moussouris

    ZOMATO’S HACKER-FOCUSED APPROACH TURNS THE TABLES ON SECURITY VULNERABILITIES Connecting eaters with restaurants is Zomato’s main business, so they took a hospitable approach to hackers, driving engagement and qualit

    Add to Reading List

    Source URL: www.hackerone.com

    Language: English - Date: 2018-08-21 12:07:31
    UPDATE