Search
Add filters:
Use filters to refine the search results.
Item hits:
Publication Date | Article Title | Author(s) |
---|---|---|
Apr-2014 | From application requests to virtual IOPs: provisioned key-value storage with Libra | Shue, David; Freedman, Michael J |
Apr-2014 | Algorithmic improvements for fast concurrent Cuckoo hashing | Li, Xiaozhou; Andersen, David G; Kaminsky, Michael; Freedman, Michael J |
1-Feb-2019 | Security and Privacy Analyses of Internet of Things Children's Toys | Chu, G; Apthorpe, N; Feamster, Nick |
2013 | Pseudorandomness for Width-2 Branching Programs | Bogdanov, Andrej; Dvir, Zeev; Verbin, Elad; Yehudayoff, Amir |
2019 | Approximation Schemes for a Unit-Demand Buyer with Independent Items via Symmetries | Kothari, Pravesh; Singla, Sahil; Mohan, Divyarthi; Schvartzman, Ariel; Weinberg, S Matthew |
9-Nov-2019 | You, Me, and IoT: How internet-connected home devices afect interpersonal relationships | Apthorpe, N; Mathur, A; Emami-Naeini, P; Chety, M; Feamster, Nick |
1-Nov-2018 | User perceptions of smart home IoT privacy | Zheng, S; Apthorpe, N; Chetty, M; Feamster, Nick |
2020 | Asynchronous Majority Dynamics in Preferential Attachment Trees | Bahrani, Maryam; Immorlica, Nicole; Mohan, Divyarthi; Weinberg, S Matthew |
Jan-2014 | NetKAT: semantic foundations for networks | Anderson, Carolyn J; Foster, Nate; Guha, Arjun; Jeannin, Jean-Baptiste; Kozen, Dexter, et al |
Jun-2020 | A Simple and Approximately Optimal Mechanism for an Additive Buyer | Babaioff, Moshe; Immorlica, Nicole; Lucier, Brendan; Weinberg, S Matthew |