University

Results: 634567



#Item
731Network architecture / Distributed computing / Gossip protocol / PRISM model checker / Computing / Application software / Distributed data storage / Software / Game theory

Analysis of a Gossip Protocol in PRISM Marta Kwiatkowska, Gethin Norman and David Parker Oxford University Computing Laboratory, Wolfson Building, Parks Road, Oxford, OX1 3QD ABSTRACT Gossip protocols have been proposed

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2008-10-20 08:29:16
732Finite-state machine / Image segmentation / Machine learning / Cellular automata / Finite automata / Automata theory / Cognition / Cognitive science / Artificial intelligence

Towards inferring environment models for control functions from recorded signal data Henrik Peters, Falk Howar, Andreas Rausch Clausthal University of Technology, Department of Informatics Julius-Albert-Str. 4, 38678 Cla

Add to Reading List

Source URL: www.falkhowar.de

Language: English - Date: 2018-09-30 08:43:02
733Artificial neural networks / Computational neuroscience / Applied mathematics / Neuroscience / Cybernetics / Computational statistics / Market research / Deep learning / Heart rate variability / Emotion recognition / Recurrent neural network / Affective computing

Calibrating the Classifier: Siamese Neural Network Architecture for End-to-End Arousal Recognition from ECG Andrea Patan`e and Marta Kwiatkowska Department of Computer Science, University of Oxford

Add to Reading List

Source URL: qav.comlab.ox.ac.uk

Language: English - Date: 2018-07-24 04:40:17
734Formal methods

Agent Verification Workshop — Panel University of Liverpool, 11th September 2015 Agent Verification Workshop — Panel Panelists:

Add to Reading List

Source URL: cgi.csc.liv.ac.uk

Language: English - Date: 2015-11-05 09:33:23
    735Computing / Internet / Free software / Adversarial machine learning / Computer security / Machine learning / Privacy / Internet privacy / Deep learning / Tor

    Jamie Hayes Contact Information University College London Dept. of Computer Science

    Add to Reading List

    Source URL: www.homepages.ucl.ac.uk

    Language: English - Date: 2018-10-24 08:20:07
    736Theoretical computer science / Metaphysics / Mathematical logic / Temporal logic / Computability theory / Model theory / Formal languages / Finite-state machine / Computation tree logic / Abstraction / Abstract interpretation / IP

    Program Synthesis using Abstraction Refinement XINYU WANG, University of Texas at Austin, USA ISIL DILLIG, University of Texas at Austin, USA RISHABH SINGH, Microsoft Research, USA We present a new approach to example-gu

    Add to Reading List

    Source URL: rishabhmit.bitbucket.io

    Language: English - Date: 2018-06-25 09:59:57
    737Software engineering / Programming language theory / Computing / Type theory / Data types / Functional languages / Type systems / Lambda calculus / HindleyMilner type system / Haskell / Agda / Dependent type

    Suggesting Valid Hole Fits for Typed-Holes (Experience Report) Matthías Páll Gissurarson Chalmers University of Technology, Sweden

    Add to Reading List

    Source URL: mpg.is

    Language: English - Date: 2018-08-05 06:01:43
    738Mathematical logic / Mathematics / Theoretical computer science / Automated theorem proving / Logic in computer science / Methods of proof / Boolean algebra / Mathematical proofs / Proof complexity / Boolean satisfiability problem

    The Potential of Interference-Based Proof Systems Marijn J.H. Heule and Benjamin Kiesl The University of Texas at Austin and Vienna University of Technology ARCADE in Gothenburg, Sweden

    Add to Reading List

    Source URL: www.cs.utexas.edu

    Language: English - Date: 2017-08-06 02:05:36
    739Statistical classification / Coding theory / Computer arithmetic / Error detection and correction / Machine learning / Computing / Naive Bayes classifier / Learning / Advanced Encryption Standard / Block cipher / Bit array / Hamming

    Practical Template-Algebraic Side Channel Attacks with Extremely Low Data Complexity Yossef Oren, Ofir Weisse and Avishai Wool Cryptography and Network Security Lab School of Electrical Engineering Tel-Aviv University, R

    Add to Reading List

    Source URL: www.ofirweisse.com

    Language: English - Date: 2018-10-17 09:19:20
    740Graph theory / Mathematics / Discrete mathematics / Directed graph / Graph / Centrality / Topological graph theory / Degree / Sequence / Sequential pattern mining / Directed acyclic graph / Pathwidth

    Complex Patterns in Dynamic Attributed Graphs Rina Singh, Jeffrey A. Graves, Douglas A. Talbert Department of Computer Science Tennessee Technological University Cookeville, TN USA

    Add to Reading List

    Source URL: gdac.uqam.ca

    Language: English - Date: 2017-10-04 00:22:43
    UPDATE