Science

Results: 788472



#Item
301Parallel computing / Application programming interfaces / Computer programming / Message Passing Interface / Computing / Edsger W. Dijkstra / Deadlock / NC / Software engineering / Model checking

Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs Vojtˇech Forejt, Daniel Kroening, Ganesh Narayanaswamy, and Subodh Sharma Department of Computer Science, University of Oxford, UK Abs

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2014-02-26 06:04:38
302Philosophy / Epistemology / Philosophy of science / Epistemology of science / Analytic philosophy / Scientific method / Falsifiability / Science / Hypothetico-deductive model / Scientific theory / Occam's razor / Theory

SoK: Science, Security, and the Elusive Goal of Security as a Scientific Pursuit Cormac Herley P.C. van Oorschot

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:02:01
303Cobb County /  Georgia / Kennesaw State University / Kennesaw /  Georgia / Marietta /  Georgia / Peace and conflict studies / Geography of Georgia U.S. state)

CURRICULUM VITAE CHARITY KERSEY BUTCHER Associate Professor of Political Science July 3, 2018 Office: Department of Political Science

Add to Reading List

Source URL: ksuweb.kennesaw.edu

Language: English - Date: 2018-07-09 10:47:42
304Experiment / Mathematical optimization / Vilfredo Pareto / Microeconomics / Multi-objective optimization / Multiple-criteria decision analysis / Probability space / Event / Markov decision process / Pareto efficiency / Mathematical analysis / Economics

Logical Methods in Computer Science Vol. 4 (4:, pp. 1–21 www.lmcs-online.org Submitted Published

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2008-11-30 12:14:57
305Software engineering / Computer programming / Theoretical computer science / Automated theorem proving / Lisp / ACL2 / Formal methods / Logic in computer science / Robert S. Boyer

Industrial Use of ACL2: Applications, Achievements, Challenges, and Directions J Strother Moore and Marijn J.H. Heule Department of Computer Science The University of Texas at Austin {moore,marijn}@cs.utexas.edu

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2017-07-30 15:10:42
306Humancomputer interaction / Reality / Computing / User interface techniques / Augmented reality / Mixed reality / Virtual reality / Multimodal interaction / Microsoft HoloLens / Head-mounted display / Internet privacy / JavaScript

1 Securing Augmented Reality Output Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner Paul G. Allen School of Computer Science & Engineering University of Washington

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 16:01:40
307American Political Science Association / Dupont Circle / APSA / Sonia Sotomayor / Trump v. Hawaii / Political science / Politics of the United States / United States

June 28, 2018 APSA Statement on Trump v. Hawaii Ruling The American Political Science Association stands by its previous condemnations (from January 30, 2017 and March 7, 2017) of the administration’s executive actions

Add to Reading List

Source URL: www.apsanet.org

Language: English - Date: 2018-06-29 08:55:08
308Software engineering / Java Pathfinder / Computer programming / Computing / Const / Obfuscation / Assembly languages / Programming language syntax / Java / P-code machine

Using Java Pathfinder to Reason about Agent Systems Franco Raimondi Department of Computer Science Middlesex University

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2015-11-05 09:33:47
309

Improved Semantic Representations From Tree-Structured Long Short-Term Memory Networks Kai Sheng Tai, Richard Socher*, Christopher D. Manning Computer Science Department, Stanford University, *MetaMind Inc. fo

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-06-01 20:23:35
    310System software / Computing / Utility software / Computer network security / Computer security / Configuration management / Network architecture / Software-defined networking / Intrusion detection system / Snort / OpenFlow / Traffic flow

    Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks Sunghwan Kim, Seunghyun Yoon, and Hyuk Lim School of Electrical Engineering and Computer Science Gwangju Institute of Science and Technol

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-14 15:46:40
    UPDATE