Skip to main content

Search

Reset

Add filters:

Use filters to refine the search results.


Item hits:
Publication DateArticle TitleAuthor(s)
26-Aug-2015Boolean Satisfiability Solvers and Their Applications in Model CheckingVizel, Y; Weissenbacher, G; Malik, Sharad
2014Using flow specifications of parameterized cache coherence protocols for verifying deadlock freedomSethi, D; Talupur, M; Malik, Sharad
29-Mar-2016Constrained sampling and counting: Universal hashing meets SAT solvingMeel, KS; Vardi, MY; Chakraborty, S; Fremont, DJ; Seshia, SA, et al
21-Jun-2017Secure Pick Up: Implicit authentication when you start using the smartphoneLee, W-H; Liu, X; Shen, Y; Jin, H; Lee, Ruby B
31-Aug-2017Implicit Smartphone User Authentication with Sensors and Contextual Machine LearningLee, W-H; Lee, Ruby B
19-Feb-2017Quantification of de-anonymization risks in social networksLee, W-H; Liu, C; Ji, S; Mittal, Prateek; Lee, Ruby
30-Oct-2017Blind De-anonymization Attacks using Social NetworksLee, W-H; Ji, S; Liu, C; Mittal, Prateek; Lee, Ruby B
18-Jul-2018Lazy self-composition for security verificationYang, W; Vizel, Y; Subramanyan, P; Gupta, A; Malik, Sharad
2-Oct-2015Excitable laser processing network node in hybrid silicon: Analysis and simulationNahmias, MA; Tait, AN; Shastri, BJ; De Lima, TF; Prucnal, Paul R
23-Mar-2015SIMPEL: circuit model for photonic spike processing laser neurons.Shastri, Bhavin J; Nahmias, Mitchell A; Tait, Alexander N; Wu, Ben; Prucnal, Paul R