Vitaly

Results: 157



#Item
21Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras  Vitaly Shmatikov

Large-Scale Collection and Sanitization of Network Security Data: Risks and Challenges∗ (position paper) Phillip Porras Vitaly Shmatikov

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2006-07-31 13:42:23
22Inducing Suffix and LCP Arrays in External Memory Timo Bingmann∗, Johannes Fischer†, and Vitaly Osipov‡ KIT, Institute of Theoretical Informatics, 76131 Karlsruhe, Germany {timo.bingmann,johannes.fischer,osipov}@ki

Inducing Suffix and LCP Arrays in External Memory Timo Bingmann∗, Johannes Fischer†, and Vitaly Osipov‡ KIT, Institute of Theoretical Informatics, 76131 Karlsruhe, Germany {timo.bingmann,johannes.fischer,osipov}@ki

Add to Reading List

Source URL: panthema.net

Language: English - Date: 2012-11-28 08:24:55
23Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-02-22 22:55:51
24Program Chairs’ Welcome Vitaly Shmatikov Cornell Tech Úlfar Erlingsson Google

Program Chairs’ Welcome Vitaly Shmatikov Cornell Tech Úlfar Erlingsson Google

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2016-05-26 14:05:52
    25i would like to be added to your list of people who oppose and condemn the aut boycott thank you -Dr. Vitaly Citovsky Professor Department of Biochemistry and Cell Biology

    i would like to be added to your list of people who oppose and condemn the aut boycott thank you -Dr. Vitaly Citovsky Professor Department of Biochemistry and Cell Biology

    Add to Reading List

    Source URL: boycottnews.haifa.ac.il

    - Date: 2006-01-15 07:06:51
      26Vitaly Nechitailenko Education: Radio Engineering Faculty of the Kharkov Polytechnic Institute in 1962, specialty “radio engineer”. Positions: 

      Vitaly Nechitailenko Education: Radio Engineering Faculty of the Kharkov Polytechnic Institute in 1962, specialty “radio engineer”. Positions: 

      Add to Reading List

      Source URL: b.gcras.ru

      Language: English - Date: 2015-12-03 08:37:34
      27Generalization in Adaptive Data Analysis and Holdout Reuse Cynthia Dwork∗ Vitaly Feldman†  Moritz Hardt‡

      Generalization in Adaptive Data Analysis and Holdout Reuse Cynthia Dwork∗ Vitaly Feldman† Moritz Hardt‡

      Add to Reading List

      Source URL: arxiv.org

      Language: English - Date: 2015-09-27 20:31:04
      28The role of gas in the UK energy mix Vitaly Vasiliev, Chief Executive Officer Gazprom Marketing and Trading Gazprom at a glance Moscow

      The role of gas in the UK energy mix Vitaly Vasiliev, Chief Executive Officer Gazprom Marketing and Trading Gazprom at a glance Moscow

      Add to Reading List

      Source URL: www.gazpromexport.com

      Language: English - Date: 2013-07-15 10:05:02
      29Machine Learning and Privacy: Friends or Foes? ---------------------------------------------Vitaly Shmatikov (Cornell Tech) Machine learning is eating the world. Modern machine learning methods, especially deep learning

      Machine Learning and Privacy: Friends or Foes? ---------------------------------------------Vitaly Shmatikov (Cornell Tech) Machine learning is eating the world. Modern machine learning methods, especially deep learning

      Add to Reading List

      Source URL: tpdp16.cse.buffalo.edu

      - Date: 2016-06-08 10:11:55
        30Measuring Relationship Anonymity in Mix Networks Vitaly Shmatikov and Ming-Hsiu Wang The University of Texas at Austin ABSTRACT Many applications of mix networks such as anonymous Web browsing require relationship anonym

        Measuring Relationship Anonymity in Mix Networks Vitaly Shmatikov and Ming-Hsiu Wang The University of Texas at Austin ABSTRACT Many applications of mix networks such as anonymous Web browsing require relationship anonym

        Add to Reading List

        Source URL: www.cyber-ta.org

        Language: English - Date: 2007-02-22 22:56:09