Guha

Results: 152



#Item
1Characterizing Large-Scale Click Fraud in ZeroAccess †✸ †✸  ✷

Characterizing Large-Scale Click Fraud in ZeroAccess †✸ †✸ ✷

Add to Reading List

Source URL: saikat.guha.cc

Language: English - Date: 2014-11-10 04:07:03
    2Verified Security for Browser Extensions Arjun Guha Matthew Fredrikson  Brown University

    Verified Security for Browser Extensions Arjun Guha Matthew Fredrikson Brown University

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2017-01-10 09:15:11
      3On Decidability of Prebisimulation for Timed Automata Shibashis Guha, Chinmay Narayan, S. Arun-Kumar Department of Computer Science and Engineering, Indian Institute of Technology, Delhi.

      On Decidability of Prebisimulation for Timed Automata Shibashis Guha, Chinmay Narayan, S. Arun-Kumar Department of Computer Science and Engineering, Indian Institute of Technology, Delhi.

      Add to Reading List

      Source URL: www.cse.iitd.ernet.in

      Language: English - Date: 2012-05-21 15:23:00
        4Dr. Tushar Guha - Founder - Chairman & Managing Director, NRITYANJALI GROUP  Nrityanjali Group has 1. Nrityanjali - the registered public charitable trust 2. Nrityanjali institution of Performing Arts, Education, Persona

        Dr. Tushar Guha - Founder - Chairman & Managing Director, NRITYANJALI GROUP Nrityanjali Group has 1. Nrityanjali - the registered public charitable trust 2. Nrityanjali institution of Performing Arts, Education, Persona

        Add to Reading List

        Source URL: nrityanjali.in

        Language: English - Date: 2017-04-21 04:52:13
          5Bootstrapping Privacy Compliance in Big Data Systems Shayak Sen∗ , Saikat Guha† , Anupam Datta∗ , Sriram K. Rajamani† , Janice Tsai‡ and Jeannette M. Wing‡ ∗ Carnegie  Mellon University, Pittsburgh, USA

          Bootstrapping Privacy Compliance in Big Data Systems Shayak Sen∗ , Saikat Guha† , Anupam Datta∗ , Sriram K. Rajamani† , Janice Tsai‡ and Jeannette M. Wing‡ ∗ Carnegie Mellon University, Pittsburgh, USA

          Add to Reading List

          Source URL: www.andrew.cmu.edu

          Language: English - Date: 2018-06-07 13:38:43
            6Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh Syed Ishtiaque Ahmed Shion Guha

            Privacy in Repair: An Analysis of the Privacy Challenges Surrounding Broken Digital Artifacts in Bangladesh Syed Ishtiaque Ahmed Shion Guha

            Add to Reading List

            Source URL: www.nixdell.com

            Language: English - Date: 2016-05-03 12:53:35
              7The Comprehensive LaTeX Symbol List

              The Comprehensive LaTeX Symbol List

              Add to Reading List

              Source URL: saikat.guha.cc

              Language: English - Date: 2005-05-30 00:33:22
                8Teaching Garbage Collection without Implementing Compilers or Interpreters Gregory H. Cooper Arjun Guha

                Teaching Garbage Collection without Implementing Compilers or Interpreters Gregory H. Cooper Arjun Guha

                Add to Reading List

                Source URL: www.eecs.northwestern.edu

                Language: English - Date: 2012-12-05 13:28:35
                9Teaching Garbage Collection without Implementing Compilers or Interpreters Gregory H. Cooper Arjun Guha

                Teaching Garbage Collection without Implementing Compilers or Interpreters Gregory H. Cooper Arjun Guha

                Add to Reading List

                Source URL: jeapostrophe.github.io

                - Date: 2018-04-03 12:30:31
                  10Tortoise: Interactive System Configuration Repair Aaron Weiss Arjun Guha  Northeastern University

                  Tortoise: Interactive System Configuration Repair Aaron Weiss Arjun Guha Northeastern University

                  Add to Reading List

                  Source URL: aaronweiss.us

                  - Date: 2018-03-21 23:30:46