Systems

Results: 323656



#Item
131Computing / Data security / Computer security / Internet privacy / Digital rights / Human rights / Terms of service / Law / Privacy / Information privacy / Information security / Proxy

Use Privacy in Data-Driven Systems Theory and Experiments with Machine Learnt Programs Anupam Datta CMU

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-15 05:23:56
132Mathematical logic / Logic / Model theory / Metalogic / Predicate logic / Formal methods / Resolution / First-order logic / Skolem normal form / Automated theorem proving / Quantifier / Axiom

11 Theorem-Proving by Resolution as a Basis for Question-Answering Systems Cordell Green Stanford Research Institute Menlo Park. California

Add to Reading List

Source URL: www.kestrel.edu

Language: English - Date: 2011-11-14 21:00:52
133Physics / Quantum information science / Quantum mechanics / Theoretical computer science / Quantum information theory / Statistical mechanics / Quantum states / Quantum entanglement / Von Neumann entropy / Schmidt decomposition / Bell state / Entropy

Lecture 11, Tues Feb 21: Quantifying Entanglement, Mixed State Entanglement How do you quantify how much entanglement there is between two quantum systems? It’s worth noting that we sort of get to decide what we think

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-08-26 18:22:54
134Information science / Mathematics / Information retrieval / Poi / Recommender system / Tourism / Personalization / Travelling salesman problem

Recommending and Planning Trip Itineraries for Individual Travellers and Groups of Tourists Kwan Hui Lim*† * Department of Computing and Information Systems, The University of Melbourne, Australia

Add to Reading List

Source URL: icaps16.icaps-conference.org

Language: English - Date: 2016-06-09 08:09:32
135Cryptography / Zero-knowledge proof / Proof of knowledge / Malleability / Mathematical proof / Non-interactive zero-knowledge proof / Ciphertext indistinguishability / Homomorphic encryption / FiatShamir heuristic

Full version of an extended abstract published in Proceedings of Eurocrypt 2012, Springer-Verlag, 2012. Available from the IACR Cryptology ePrint Archive as ReportMalleable Proof Systems and Applications Melis

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
136Artificial intelligence / Computational neuroscience / Machine learning / Learning / Artificial neural networks / Market research / Convolutional neural network / Outline of machine learning / MNIST database / Supervised learning / Variational Bayesian methods / Bayesian network

Imitation Learning of Hierarchical Programs via Variational Inference Roy Fox * 1 Richard Shin * 1 Pieter Abbeel 1 Ken Goldberg 1 2 Dawn Song 1 Ion Stoica 1 The design of controllers that operate in dynamical systems to

Add to Reading List

Source URL: uclmr.github.io

Language: English - Date: 2018-08-06 06:17:49
137Computing / Concurrent computing / Cache coherency / Computer architecture / Transaction processing / Cache / Parallel computing / Concurrency control / CPU cache / MESI protocol / Cache coherence / Victim cache

Characterization of TCC on Chip-Multiprocessors Austen McDonald, JaeWoong Chung, Hassan Chafi, Chi Cao Minh, Brian D. Carlstrom Lance Hammond, Christos Kozyrakis, Kunle Olukotun Computer Systems Laboratory Stanford Unive

Add to Reading List

Source URL: www.austenmcdonald.com

Language: English - Date: 2016-01-26 12:43:51
138Cryptography / Cryptocurrencies / Alternative currencies / Bitcoin / Digital currencies / Public-key cryptography / Mihir Bellare / SUF / RSA

UNIVERSITY OF CALIFORNIA, SAN DIEGO Flexible Models for Secure Systems A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
139Computing / Computer programming / Software engineering / Inter-process communication / Object-oriented programming languages / Programming languages / Actor model / Concurrent computing / Akka / Leader election / Message passing / Schedule

Minimizing Faulty Executions of Distributed Systems Aurojit Panda? Vjekoslav Brajkovic George Necula? Arvind Krishnamurthy† Scott Shenker?

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2016-02-16 17:31:03
140Functional predicate / Model theory / Symbol / Limit of a function / Universal quantification / Mathematical logic / Mathematics / Logic

A Relational Encoding for a Clash-Free Subset of ASMs Gerhard Schellhorn, Gidon Ernst, J¨org Pf¨ahler, and Wolfgang Reif Institute for Software and Systems Engineering University of Augsburg, Germany {schellhorn,ernst,

Add to Reading List

Source URL: www.isse.uni-augsburg.de

Language: English - Date: 2017-01-11 10:50:05
UPDATE