Mehrdad

Results: 58



#Item
11Education / Semantics / Cognition / Cognitive science / Analogy / Teaching / Educational psychology / Tutor / Intelligent tutoring system / Analogical models

A Study of Analogy in Computer Science Tutorial Dialogues Mehrdad Alizadeh1 , Barbara Di Eugenio1 , Rachel Harsley1 , Nick Green1 , Davide Fossati2 and Omar AlZoubi2 1 Computer Science Department, University of Illinois

Add to Reading List

Source URL: nlp.cs.uic.edu

Language: English - Date: 2015-03-09 14:52:31
12

Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades Mehrdad Farajtabar∗ Manuel Gomez-Rodriguez† Nan Du∗ Mohammad Zamani" Hongyuan Zha∗ Le Song∗ ∗

Add to Reading List

Source URL: jmlr.org

Language: English - Date: 2016-05-01 21:17:10
    13

    Compiler Validation via Equivalence Modulo Inputs Vu Le, Mehrdad Afshari, Zhendong Su University of California, Davis llvm bug 14972

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2014-06-17 01:50:42
      14

      Secure Computation on Floating Point Numbers Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, and Aaron Steele Department of Computer Science and Engineering University of Notre Dame {maliasga,mblanton,yzhang16,asteele2}@

      Add to Reading List

      Source URL: www.cse.nd.edu

      Language: English - Date: 2012-12-17 12:03:07
        15

        Data-Oblivious Graph Algorithms for Secure Computation and Outsourcing Marina Blanton, Aaron Steele, and Mehrdad Aliasgari Department of Computer Science and Engineering University of Notre Dame

        Add to Reading List

        Source URL: www.cse.nd.edu

        Language: English - Date: 2013-04-03 19:41:44
          16

          Secure Outsourcing of DNA Searching via Finite Automata Marina Blanton and Mehrdad Aliasgari Department of Computer Science and Engineering, University of Notre Dame, {mblanton,maliasga}@cse.nd.edu

          Add to Reading List

          Source URL: www.cse.nd.edu

          Language: English - Date: 2010-04-19 21:32:59
            17

            1 Analysis of Reusability of Secure Sketches and Fuzzy Extractors Marina Blanton∗ and Mehrdad Aliasgari Department of Computer Science and Engineering

            Add to Reading List

            Source URL: www.cse.nd.edu

            Language: English - Date: 2013-07-06 12:28:17
              18

              Secure Computation of Hidden Markov Models Mehrdad Aliasgari and Marina Blanton Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, IN, USA , Keywords:

              Add to Reading List

              Source URL: www.cse.nd.edu

              Language: English - Date: 2013-05-20 15:58:15
                19

                ON THE (NON-)REUSABILITY OF FUZZY SKETCHES AND EXTRACTORS AND SECURITY IN THE COMPUTATIONAL SETTING∗ Marina Blanton and Mehrdad Aliasgari Department of Computer Science and Engineering, University of Notre Dame

                Add to Reading List

                Source URL: www.cse.nd.edu

                Language: English - Date: 2011-05-27 11:55:16
                  20

                  Secure Outsourced Computation of Iris Matching∗ Marina Blanton and Mehrdad Aliasgari Department of Computer Science and Engineering University of Notre Dame {mblanton,maliasga}@cse.nd.edu

                  Add to Reading List

                  Source URL: www.cse.nd.edu

                  Language: English - Date: 2012-03-16 21:29:04
                    UPDATE