Atallah

Results: 57



#Item
1Practical Lessons from Predicting Clicks on Ads at Facebook Xinran He, Junfeng Pan, Ou Jin, Tianbing Xu, Bo Liu∗, Tao Xu∗, Yanxin Shi∗, Antoine Atallah∗, Ralf Herbrich∗, Stuart Bowers, Joaquin Quiñonero Candel

Practical Lessons from Predicting Clicks on Ads at Facebook Xinran He, Junfeng Pan, Ou Jin, Tianbing Xu, Bo Liu∗, Tao Xu∗, Yanxin Shi∗, Antoine Atallah∗, Ralf Herbrich∗, Stuart Bowers, Joaquin Quiñonero Candel

Add to Reading List

Source URL: research.fb.com

- Date: 2016-11-04 03:24:20
    2Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye

    Covert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication? Mohammed H. Almeshekah, Mikhail J. Atallah, and Eugene H. Spafford Purdue University CERIAS 656 Oval Drive, West Lafaye

    Add to Reading List

    Source URL: spaf.cerias.purdue.edu

    Language: English - Date: 2013-03-04 21:29:09
    3Translation-Based Steganography  Christian Grotho Krista Grotho Ludmila Alkhutova Ryan Stutsman Mikhail Atallah CERIAS, Purdue University {christian,krista}@grothoff.org, {lalkhuto,rstutsma}@purdue.edu,

    Translation-Based Steganography Christian Grotho Krista Grotho Ludmila Alkhutova Ryan Stutsman Mikhail Atallah CERIAS, Purdue University {christian,krista}@grothoff.org, {lalkhuto,rstutsma}@purdue.edu,

    Add to Reading List

    Source URL: rstutsman.github.io

    Language: English - Date: 2016-01-06 11:53:39
      4Translation-Based Steganography  Christian Grotho Krista Grotho Ludmila Alkhutova Ryan Stutsman Mikhail Atallah CERIAS, Purdue University {christian,krista}@grothoff.org, {lalkhuto,rstutsma}@purdue.edu,

      Translation-Based Steganography Christian Grotho Krista Grotho Ludmila Alkhutova Ryan Stutsman Mikhail Atallah CERIAS, Purdue University {christian,krista}@grothoff.org, {lalkhuto,rstutsma}@purdue.edu,

      Add to Reading List

      Source URL: rstutsman.github.io

      Language: English - Date: 2016-01-06 11:53:39
        5Dynamic and Efficient Key Management for Access Hierarchies ∗ Mikhail J. Atallah, Keith B. Frikken, and Marina Blanton Department of Computer Science

        Dynamic and Efficient Key Management for Access Hierarchies ∗ Mikhail J. Atallah, Keith B. Frikken, and Marina Blanton Department of Computer Science

        Add to Reading List

        Source URL: www.cse.nd.edu

        Language: English - Date: 2007-08-02 16:59:37
          6Efficient Techniques for Realizing Geo-Spatial Access Control Mikhail J. Atallah∗ Marina Blanton†

          Efficient Techniques for Realizing Geo-Spatial Access Control Mikhail J. Atallah∗ Marina Blanton†

          Add to Reading List

          Source URL: www.cse.nd.edu

          Language: English - Date: 2007-08-02 16:59:36
            7Private Combinatorial Group Testing Mikhail J. Atallah∗ Keith B. Frikken  Marina Blanton

            Private Combinatorial Group Testing Mikhail J. Atallah∗ Keith B. Frikken Marina Blanton

            Add to Reading List

            Source URL: www.cse.nd.edu

            Language: English - Date: 2008-01-21 10:54:48
              8Achieving Fairness in Private Contract Negotiation ? Keith Frikken and Mikhail Atallah CERIAS and Department of Computer Sciences Purdue University

              Achieving Fairness in Private Contract Negotiation ? Keith Frikken and Mikhail Atallah CERIAS and Department of Computer Sciences Purdue University

              Add to Reading List

              Source URL: fc05.ifca.ai

              Language: English - Date: 2005-01-13 10:36:00
                9A Grid of Java CardsTM∗ to Deal with Security Demanding Application Domains Eve Atallah† Serge Chaumette  Frank Darrigade

                A Grid of Java CardsTM∗ to Deal with Security Demanding Application Domains Eve Atallah† Serge Chaumette Frank Darrigade

                Add to Reading List

                Source URL: damien.sauveron.fr

                Language: English - Date: 2013-02-26 15:54:33
                  10ViWiD : Visible Watermarking based Defense against Phishing Mercan Topkara Ashish Kamra Mikhail J. Atallah Cristina Nita-Rotaru Center for Education and Research in Information Assurance Computer Sciences Department Purd

                  ViWiD : Visible Watermarking based Defense against Phishing Mercan Topkara Ashish Kamra Mikhail J. Atallah Cristina Nita-Rotaru Center for Education and Research in Information Assurance Computer Sciences Department Purd

                  Add to Reading List

                  Source URL: homes.cerias.purdue.edu

                  Language: English - Date: 2005-06-21 14:27:47