Institute of technology

Results: 58361



#Item
1Estimating the strength of unlabeled information during semi-supervised learning Brenden M. Lake () Department of Brain and Cognitive Sciences, Massachusetts Institute of Technology  James L. McClelland (m

Estimating the strength of unlabeled information during semi-supervised learning Brenden M. Lake () Department of Brain and Cognitive Sciences, Massachusetts Institute of Technology James L. McClelland (m

Add to Reading List

Source URL: cims.nyu.edu

Language: English - Date: 2011-05-20 18:34:42
2Model-Driven Software Verification Gerard J. Holzmann Rajeev Joshi JPL Laboratory for Reliable Software California Institute of Technology 4800 Oak Grove Drive

Model-Driven Software Verification Gerard J. Holzmann Rajeev Joshi JPL Laboratory for Reliable Software California Institute of Technology 4800 Oak Grove Drive

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:26:03
3Exploiting Traces in Program Analysis Alex Groce and Rajeev Joshi Laboratory for Reliable Software?? , Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109, USA

Exploiting Traces in Program Analysis Alex Groce and Rajeev Joshi Laboratory for Reliable Software?? , Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109, USA

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:26:03
4BharatNet Planning Tool User Manual Indian Institute of Technology Bombay  3

BharatNet Planning Tool User Manual Indian Institute of Technology Bombay 3

Add to Reading List

Source URL: grammarg.in

Language: English
5Extending Model Checking with Dynamic Analysis Alex Groce and Rajeev Joshi Laboratory for Reliable Software Jet Propulsion Laboratory California Institute of Technology

Extending Model Checking with Dynamic Analysis Alex Groce and Rajeev Joshi Laboratory for Reliable Software Jet Propulsion Laboratory California Institute of Technology

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:45:03
6Randomized Differential Testing as a Prelude to Formal Verification Alex Groce, Gerard Holzmann, and Rajeev Joshi Laboratory for Reliable Software ∗ Jet Propulsion Laboratory California Institute of Technology Pasadena

Randomized Differential Testing as a Prelude to Formal Verification Alex Groce, Gerard Holzmann, and Rajeev Joshi Laboratory for Reliable Software ∗ Jet Propulsion Laboratory California Institute of Technology Pasadena

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:31:43
7Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division.  Nigel Smart, Professor of Cryptology,

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

Add to Reading List

Source URL: zkp.science

Language: English - Date: 2018-09-15 05:52:51
8BPOE-9 workshop The ninth workshop on Big Data Benchmarks, Performance Optimization, and Emerging Hardware INSTITUTE OF COMPUTING TECHNOLOGY

BPOE-9 workshop The ninth workshop on Big Data Benchmarks, Performance Optimization, and Emerging Hardware INSTITUTE OF COMPUTING TECHNOLOGY

Add to Reading List

Source URL: prof.ict.ac.cn

Language: English - Date: 2018-04-01 04:31:31
9Object Support in an Array-Based GPGPU Extension for Ruby Matthias Springer Hidehiko Masuhara  Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Japan

Object Support in an Array-Based GPGPU Extension for Ruby Matthias Springer Hidehiko Masuhara Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Japan

Add to Reading List

Source URL: m-sp.org

Language: English - Date: 2018-09-27 01:14:42
10Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1  Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 06:46:30