NICTA

Results: 817



#Item
31Language and Document Analysis: Motivating Latent variable Models Wray Buntine National ICT Australia (NICTA)  MLSS, ANU, Jan., 2009

Language and Document Analysis: Motivating Latent variable Models Wray Buntine National ICT Australia (NICTA) MLSS, ANU, Jan., 2009

Add to Reading List

Source URL: ssll.rsise.anu.edu.au

Language: English - Date: 2009-02-12 22:12:06
    32Lyrebird — Assigning Meanings to Machines David Cock NICTA & University of New South Wales 1  Abstract

    Lyrebird — Assigning Meanings to Machines David Cock NICTA & University of New South Wales 1 Abstract

    Add to Reading List

    Source URL: research.davidcock.fastmail.fm

    Language: English - Date: 2014-11-20 18:54:57
      33Exploiting Within-Clique Factorizations in Junction-Tree Algorithms  Julian J. McAuley NICTA - Australian National University  Tib´

      Exploiting Within-Clique Factorizations in Junction-Tree Algorithms Julian J. McAuley NICTA - Australian National University Tib´

      Add to Reading List

      Source URL: tiberiocaetano.com

      Language: English - Date: 2010-02-19 02:22:05
        34Exploitation as an Inference Problem David Cock NICTA and University of New South Wales  ABSTRACT In this position paper, we suggest that an adversary seeking to exploit a side channel should be view

        Exploitation as an Inference Problem David Cock NICTA and University of New South Wales ABSTRACT In this position paper, we suggest that an adversary seeking to exploit a side channel should be view

        Add to Reading List

        Source URL: research.davidcock.fastmail.fm

        Language: English - Date: 2014-11-20 18:54:15
          35Language and Document Analysis: Motivating Latent variable Models Wray Buntine National ICT Australia (NICTA)  MLSS, ANU, Jan., 2009

          Language and Document Analysis: Motivating Latent variable Models Wray Buntine National ICT Australia (NICTA) MLSS, ANU, Jan., 2009

          Add to Reading List

          Source URL: ssll.rsise.anu.edu.au

          Language: English - Date: 2009-02-12 22:12:11
            36Verifying Probabilistic Correctness in Isabelle with pGCL David Cock NICTA Sydney, Australia∗ School of Computer Science and Engineering

            Verifying Probabilistic Correctness in Isabelle with pGCL David Cock NICTA Sydney, Australia∗ School of Computer Science and Engineering

            Add to Reading List

            Source URL: research.davidcock.fastmail.fm

            Language: English - Date: 2014-11-20 18:53:57
              37Adi Botea Contact and Personal Information NICTA, Canberra Research Laboratory Locked Bag 8001 Canberra ACT 2601 Australia

              Adi Botea Contact and Personal Information NICTA, Canberra Research Laboratory Locked Bag 8001 Canberra ACT 2601 Australia

              Add to Reading List

              Source URL: abotea.rsise.anu.edu.au

              Language: English - Date: 2011-02-27 23:53:24
                38Hash Kernels  Qinfeng Shi, James Petterson Australian National University and NICTA, Canberra, Australia

                Hash Kernels Qinfeng Shi, James Petterson Australian National University and NICTA, Canberra, Australia

                Add to Reading List

                Source URL: www2.mta.ac.il

                Language: English - Date: 2010-08-18 19:13:49
                  39APPLIED PHYSICS LETTERS 91, 084103 !2007

                  APPLIED PHYSICS LETTERS 91, 084103 !2007" Rich-club phenomenon across complex network hierarchies Julian J. McAuleya! Statistical Machine Learning Program, NICTA, Canberra, Australian Capital Territory 0200, Australia

                  Add to Reading List

                  Source URL: tiberiocaetano.com

                  Language: English - Date: 2008-05-10 06:37:23
                    40Timing Analysis of a Protected Operating System Kernel Bernard Blackham† , Yao Shi† , Sudipta Chattopadhyay‡ , Abhik Roychoudhury‡ and Gernot Heiser† † NICTA and University of New South Wales, Sydney, Austral

                    Timing Analysis of a Protected Operating System Kernel Bernard Blackham† , Yao Shi† , Sudipta Chattopadhyay‡ , Abhik Roychoudhury‡ and Gernot Heiser† † NICTA and University of New South Wales, Sydney, Austral

                    Add to Reading List

                    Source URL: www.comp.nus.edu.sg

                    Language: English - Date: 2011-10-10 06:05:28