Turing machine

Results: 564



#Item
31Spectral Graph Theory and Applications  WSLecture 9: Undirected Connectivity in Log-Space Lecturer: Thomas Sauerwald & He Sun

Spectral Graph Theory and Applications WSLecture 9: Undirected Connectivity in Log-Space Lecturer: Thomas Sauerwald & He Sun

Add to Reading List

Source URL: resources.mpi-inf.mpg.de

Language: English - Date: 2012-01-13 07:00:53
32Computational Irreducibility and Computational Analogy

Computational Irreducibility and Computational Analogy

Add to Reading List

Source URL: www.complex-systems.com

Language: English - Date: 2015-10-12 16:05:50
33Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
34Journal of Statistical Physics, Vol. 104, Nos. 3/4, 2001  Computational Mechanics: Pattern and Prediction, Structure and Simplicity Cosma Rohilla Shalizi 1 , 2 and James P. Crutchfield 1 Received June 20, 2000; revised F

Journal of Statistical Physics, Vol. 104, Nos. 3/4, 2001 Computational Mechanics: Pattern and Prediction, Structure and Simplicity Cosma Rohilla Shalizi 1 , 2 and James P. Crutchfield 1 Received June 20, 2000; revised F

Add to Reading List

Source URL: bactra.org

Language: English - Date: 2003-10-31 16:37:58
35Summer 2009 :: COM SCI 181, Sec.1 :: Introduction to Formal Languages and Automata Theory :: Syllabus/Info Class Information Location, day, time: *from the Registrar

Summer 2009 :: COM SCI 181, Sec.1 :: Introduction to Formal Languages and Automata Theory :: Syllabus/Info Class Information Location, day, time: *from the Registrar

Add to Reading List

Source URL: atakangunal.com

Language: English - Date: 2014-10-22 13:26:26
36Toward Facilitating Assistance to Students Attempting Engineering Design Problems Elena L. Glassman Ned Gulley

Toward Facilitating Assistance to Students Attempting Engineering Design Problems Elena L. Glassman Ned Gulley

Add to Reading List

Source URL: eglassman.github.io

Language: English - Date: 2016-07-29 16:41:12
37

"What Does a Computer Simulation Have to Reproduce? The Case of VMWare" Introduction The VMWare products and other virtualization and emulation technologies are not new (VMWare itself dates from the 1990s; emulation in a

Add to Reading List

Source URL: philosopher-animal.com

Language: English - Date: 2010-08-13 21:51:26
38Who Can Name the Bigger Number? Scott Aaronson∗ 1999 In an old joke, two noblemen vie to name the bigger number. The first, after ruminating for hours, triumphantly announces ”Eighty-three!” The second,

Who Can Name the Bigger Number? Scott Aaronson∗ 1999 In an old joke, two noblemen vie to name the bigger number. The first, after ruminating for hours, triumphantly announces ”Eighty-three!” The second,

Add to Reading List

Source URL: homepages.math.uic.edu

Language: English - Date: 2016-01-08 10:48:49
39Safety to the Weak! Security Through Feebleness: An Unorthodox Manifesto Rick McGeer, US Ignite  Outline

Safety to the Weak! Security Through Feebleness: An Unorthodox Manifesto Rick McGeer, US Ignite Outline

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:40:05
40Rooter: A Methodology for the Typical Unification of Access Points and Redundancy Jeremy Stribling, Daniel Aguayo and Maxwell Krohn A BSTRACT Many physicists would agree that, had it not been for congestion control, the

Rooter: A Methodology for the Typical Unification of Access Points and Redundancy Jeremy Stribling, Daniel Aguayo and Maxwell Krohn A BSTRACT Many physicists would agree that, had it not been for congestion control, the

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2005-04-09 16:37:16