Institute of technology

Results: 58361



#Item
1Machine learning / Semi-supervised learning / Labeled data / Supervised learning

Estimating the strength of unlabeled information during semi-supervised learning Brenden M. Lake () Department of Brain and Cognitive Sciences, Massachusetts Institute of Technology James L. McClelland (m

Add to Reading List

Source URL: cims.nyu.edu

Language: English - Date: 2011-05-20 18:34:42
2Model checkers / Software engineering / Theoretical computer science / Formal methods / C / C++ / Sizeof / Model checking / Promela / Abstraction / Computing / Abstract interpretation

Model-Driven Software Verification Gerard J. Holzmann Rajeev Joshi JPL Laboratory for Reliable Software California Institute of Technology 4800 Oak Grove Drive

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:26:03
3FO / Finite model theory / Model theory / Metaphilosophy / Mathematical logic / Mathematics / Sigma-algebra / Pattern language

Exploiting Traces in Program Analysis Alex Groce and Rajeev Joshi Laboratory for Reliable Software?? , Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA 91109, USA

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:26:03
4Bharat Broadband Network / Spreadsheet / Wi-Fi / Application programming interface / Global Positioning System / Microsoft Excel / Computing / Technology / Software

BharatNet Planning Tool User Manual Indian Institute of Technology Bombay 3

Add to Reading List

Source URL: grammarg.in

Language: English
5Model checkers / Software engineering / Computing / Model checking / Theoretical computer science / SPIN model checker / Stack / Promela / Exception handling / Device driver synthesis and verification

Extending Model Checking with Dynamic Analysis Alex Groce and Rajeev Joshi Laboratory for Reliable Software Jet Propulsion Laboratory California Institute of Technology

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:45:03
6Software testing / Software engineering / Computing / Quality / Fault injection / Software verification / Reliability engineering / Formal verification / Flash memory / Software quality / Stress testing / Exception handling

Randomized Differential Testing as a Prelude to Formal Verification Alex Groce, Gerard Holzmann, and Rajeev Joshi Laboratory for Reliable Software ∗ Jet Propulsion Laboratory California Institute of Technology Pasadena

Add to Reading List

Source URL: rjoshi.org

Language: English - Date: 2010-09-11 18:31:43
7Cryptography / Secret sharing / Public-key cryptography / Secure multi-party computation / Commitment scheme / Cryptographic protocol / Block cipher / Zero-knowledge proof

Rene Peralta and John Kelsey, National Institute of Standards and Technology, Computer Security Division. Nigel Smart, Professor of Cryptology,

Add to Reading List

Source URL: zkp.science

Language: English - Date: 2018-09-15 05:52:51
8Computing / Concurrent computing / Distributed computing / Computer networking / International Conference on Architectural Support for Programming Languages and Operating Systems / Benchmark / Artificial intelligence / Data center

BPOE-9 workshop The ninth workshop on Big Data Benchmarks, Performance Optimization, and Emerging Hardware INSTITUTE OF COMPUTING TECHNOLOGY

Add to Reading List

Source URL: prof.ict.ac.cn

Language: English - Date: 2018-04-01 04:31:31
9Computing / Software engineering / Computer programming / Parallel computing / Graphics hardware / Object-oriented programming languages / GPGPU / Cross-platform software / CUDA / General-purpose computing on graphics processing units / AOS and SOA / Thread

Object Support in an Array-Based GPGPU Extension for Ruby Matthias Springer Hidehiko Masuhara Department of Mathematical and Computing Sciences, Tokyo Institute of Technology, Japan

Add to Reading List

Source URL: m-sp.org

Language: English - Date: 2018-09-27 01:14:42
10Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 06:46:30
UPDATE