Diego

Results: 22323



#Item
11Cryptography / Public-key cryptography / Pairing-based cryptography / Elliptic curve cryptography / Pairing / IBE

Déjà Q: Using Dual Systems to Revisit q-Type Assumptions Melissa Chase (MSR Redmond) Sarah Meiklejohn (UC San Diego → University College London)

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
12Software engineering / Computer programming / Computing / Object-oriented programming / Component-based software engineering / Inter-process communication / C++ / Component Object Model / Inline function / ECO / Scope / C standard library

Appeared in Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI 2000), pages 347–360, San Diego, CA, October 23–25, 2000. Knit: Component Composition for Systems Software Alastair

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2000-10-30 16:55:50
13Algebra / Abstract algebra / XTR / Verifiable random function / Computational hardness assumptions / Group theory / Lie groups

Full version of an extended abstract published in Proceedings of Eurocrypt 2014, Springer-Verlag, 2014. D´ej`a Q: Using Dual Systems to Revisit q-Type Assumptions Sarah Meiklejohn∗ UC San Diego

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
14Artificial neural networks / Computational neuroscience / Applied mathematics / Cybernetics / Neuroscience / Convolutional neural network / Long short-term memory / Recurrent neural network / Artificial intelligence

Poster: Summarized Network Behavior Prediction Shih-Chieh Su∗ Qualcomm Inc. San Diego, CA, 92121 Email: ∗

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-26 01:29:24
15Cryptography / Cryptocurrencies / Alternative currencies / Bitcoin / Digital currencies / Public-key cryptography / Mihir Bellare / SUF / RSA

UNIVERSITY OF CALIFORNIA, SAN DIEGO Flexible Models for Secure Systems A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
16Computing / Computational linguistics / Linguistics / Information science / Artificial neural network / SPARQL / Semantic parsing / Word-sense disambiguation / Semantic Web / Natural language processing / Query language / Question answering

Neural Machine Translation for Query Construction and Composition Tommaso Soru 1 Edgard Marx 1 Andr´e Valdestilhas 1 Diego Esteves 2 Diego Moussallem 1 Gustavo Publio 1 Abstract Research on question answering with know

Add to Reading List

Source URL: uclmr.github.io

Language: English - Date: 2018-08-06 06:17:49
17Cryptography / Public-key cryptography / Computer network security / ID-based encryption / Identity-based cryptography / Internet privacy / Computer security / Privacy / Information technology audit

The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion Sarah Meiklejohn∗ UC San Diego Keaton Mowery†

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
18Statistical natural language processing / Machine learning / Artificial intelligence / Learning / Topic model / Causal inference / Latent Dirichlet allocation / Experiment / Mixture model / Unsupervised learning

Structural Topic Models for Open-Ended Survey Responses Margaret E. Roberts University of California, San Diego Brandon M. Stewart Harvard University Dustin Tingley Harvard University Christopher Lucas Harvard University

Add to Reading List

Source URL: scholar.harvard.edu

Language: English - Date: 2014-03-07 09:26:14
19

SWIFT: Predictive Fast Reroute Technical Report Thomas Holterbach∗† , Stefano Vissicchio‡ , Alberto Dainotti† , Laurent Vanbever∗ ∗ ETH Zürich, † CAIDA, UC San Diego, ‡ University College London ABSTRACT

Add to Reading List

Source URL: swift.ethz.ch

Language: English - Date: 2017-09-11 06:28:39
    20Denial-of-service attacks / Cyberwarfare / Computing / Computer security / Denial-of-service attack / Transmission Control Protocol / IP address spoofing / SYN flood / Ping / Port scanner / LAND / UDP flood attack

    Inferring Internet Denial-of-Service Activity David Moore CAIDA San Diego Supercomputer Center University of California, San Diego

    Add to Reading List

    Source URL: cseweb.ucsd.edu

    Language: English - Date: 2001-05-18 13:11:42
    UPDATE