Search
Add filters:
Use filters to refine the search results.
Item hits:
Publication Date | Article Title | Author(s) |
---|---|---|
Jan-2014 | NetKAT: semantic foundations for networks | Anderson, Carolyn J; Foster, Nate; Guha, Arjun; Jeannin, Jean-Baptiste; Kozen, Dexter, et al |
Jun-2020 | A Simple and Approximately Optimal Mechanism for an Additive Buyer | Babaioff, Moshe; Immorlica, Nicole; Lucier, Brendan; Weinberg, S Matthew |
2016 | Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits | Badrinarayanan, Saikrishna; Miles, Eric; Sahai, Amit; Zhandry, Mark |
2019 | Revisiting Post-quantum Fiat-Shamir | Liu, Qipeng; Zhandry, Mark |
2018 | Parameter-Hiding Order Revealing Encryption | Cash, David; Liu, Feng-Hao; O’Neill, Adam; Zhandry, Mark; Zhang, Cong |
Jun-2016 | Temporal NetKAT | Beckett, Ryan; Greenberg, Michael; Walker, David |
2016 | Secure Obfuscation in a Weak Multilinear Map Model | Garg, Sanjam; Miles, Eric; Mukherjee, Pratyay; Sahai, Amit; Srinivasan, Akshayaram, et al |
Jun-2016 | A duality based unified approach to Bayesian mechanism design | Cai, Yang; Devanur, Nikhil R; Weinberg, S Matthew |
2015 | Tracking the Flow of Ideas through the Programming Languages Literature | Greenberg, Michael; Fisher, Kathleen; Walker, David |
2019 | Approximation Schemes for a Unit-Demand Buyer with Independent Items via Symmetries | Kothari, Pravesh; Singla, Sahil; Mohan, Divyarthi; Schvartzman, Ariel; Weinberg, S Matthew |