Search
Add filters:
Use filters to refine the search results.
Item hits:
Publication Date | Article Title | Author(s) |
---|---|---|
2012 | On the Feasibility of Internet-Scale Author Identification | Narayanan, Arvind; Paskov, Hristo; Gong, Neil Z; Bethencourt, John; Stefanov, Emil, et al |
Jan-2015 | Relax, no need to round: Integrality of clustering formulations | Awasthi, Pranjal; Bandeira, Afonso S; Charikar, Moses; Krishnaswamy, Ravishankar; Villar, Soledad, et al |
2014 | Routes for breaching and protecting genetic privacy | Erlich, Yaniv; Narayanan, Arvind |
10-Sep-2013 | Revisiting a summer vacation: digital restoration and typesetter forensics | Bagley, Steven R; Brailsford, David F; Kernighan, Brian W |
2020 | Deep-inverse correlography: towards real-time high-resolution non-line-of-sight imaging | Metzler, CA; Heide, F; Rangarajan, P; Balaji, MM; Viswanath, A, et al |
Mar-2012 | Automatic speculative DOALL for clusters | Kim, Hanjun; Johnson, Nick P; Lee, Jae W; Mahlke, Scott A; August, David I |
2016 | Modular Verification for Computer Security | Appel, Andrew W |
2011 | Matching Vector Codes | Dvir, Zeev; Gopalan, Parikshit; Yekhanin, Sergey |
2021 | Facebook's Tectonic Filesystem: Efficiency from Exascale | Pan, Satadru; Stavrinos, Theano; Zhang, Yunqiao; Sikaria, Atul; Zakharov, Pavel, et al |
2012 | Performance Isolation and Fairness for Multi-Tenant Cloud Storage | Shue, David; Freedman, Michael J; Shaikh, Anees |