subject: Computer Science date: 2015
10.4231/R7N58J9Z
Baichuan Zhang , Bartlomiej P. Rajwa , Murat Dundar , Qiang Kou , Yicheng He
10/01/2015
A study contrasting K-means-based unsupervised feature learning and deep learning techniques for small data sets with limited intra- as well as inter-class diversity
bacterial colonies BARDOT Biomedical Engineering Computer Science deep learning Elastic light scattering Interdisciplinary Research K-Means Clustering Life Sciences Machine Learning representation learning
10.4231/R7ZG6Q6T
12/30/2015
This includes symbolic versions of some of the more important OPQ routines.
Airy weight function Bose-Einstein distribution Chebyshev-type quadratures Classical weight functions Computer Science Fermi Dirac weight Function Freud weight function Gauss-type quadrature rules Hermite weight function Jacobi weight functions K-Bessel weight function Laguerre weight functions Mathematics Matlab OPQ routine Orthogonal polynomials Perl Script quadrature Software source code Walter Gautschi Archives Walter Gautschi Selected Works
10.4231/R7SX6B5R
Austin J. Klasa , Courtney Falk
08/19/2015
Public cloud risk assessment tool.
Computer Science Information Security Java Modeling Public cloud providers Risk assessment software Source Code
10.4231/R7JD4TQM
08/31/2015
A CSV and accompanying HTML zip file of data taken at a survey about data sharing during HUBbub 2013.
10.4231/R7GH9FWM
11/20/2015
This file contains C++ source code for the numerical experiments described in the paper Polynomial Fitting Known Plaintext Attack.
Computer Science cryptanalysis encryption Information Security known plaintext attack polynomial fitting
10.4231/R7736NV6
07/30/2015
Public cloud risk assessment tool.
Computer Science Information Security Java Modeling Public cloud providers Risk assessment software Source Code
10.4231/R72V2D12
Brian Curnett , Melissa J. Dark
06/02/2015
The data set included the participants' identification number (USER ID), the participants' assigned password policy identification number (POLICY ID), and seven iterations of passwords (PASSWORD 1-7).
Computer Science Longitudinal Study Password Analysis Password Policies Passwords Real-World Passwords
Display #
Results 1 - 7 of 7