Index of /files/trevor/papers/emintham-Papers/

NameLast ModifiedSizeType
../ -  Directory
AI in Games/2023-May-01 03:31:50-  Directory
BIM/2023-May-01 03:31:51-  Directory
Behavioural Economics/2023-May-01 03:31:52-  Directory
Bitcoin/2023-May-01 03:31:52-  Directory
Compression/2023-May-01 03:31:53-  Directory
Computer Architecture/2023-May-01 03:31:53-  Directory
Crypto/2023-May-01 03:31:53-  Directory
Distributed Computing/2023-May-01 03:31:54-  Directory
Economics of Underground Markets/2023-May-01 03:31:54-  Directory
Food Engineering/2023-May-01 03:31:55-  Directory
Functional Programming/2023-May-01 03:31:55-  Directory
Google/2023-May-01 03:31:55-  Directory
HPC/2023-May-01 03:31:55-  Directory
Heterogenous Computing/2023-May-01 03:31:56-  Directory
Information Theory/2023-May-01 03:31:56-  Directory
Investing/2023-May-01 03:31:56-  Directory
ML/2023-May-01 03:31:58-  Directory
NLP/2023-May-01 03:31:59-  Directory
Negotiation Journal/2023-May-01 03:31:59-  Directory
Pattern Recognition/2023-May-01 03:32:00-  Directory
Portfolio/2023-May-01 03:32:00-  Directory
Psychology/2023-May-01 03:32:00-  Directory
Puzzles/2023-May-01 03:32:00-  Directory
Quantum Computation/2023-May-01 03:32:00-  Directory
Reverse Engineering/2023-May-01 03:32:01-  Directory
Security and Privacy/2023-May-01 03:32:02-  Directory
Software Analysis/2023-May-01 03:32:02-  Directory
Software Architecture and Protocols/2023-May-01 03:32:02-  Directory
Software Engineering/2023-May-01 03:32:02-  Directory
Theory/2023-May-01 03:32:03-  Directory
meta-CS/2023-May-01 03:32:05-  Directory
10th USENIX Symposium on OS Design and Implementation.pdf2025-Jan-04 23:47:1610.5Mapplication/pdf
22nd USENIX Security Symposium.pdf2025-Jan-04 23:47:1626.5Mapplication/pdf
Aaronson- Limits on Efficient Computation in the Physical World.pdf2025-Jan-04 23:47:162.0Mapplication/pdf
Abadi,Needham- Prudent Engineering Practice for Cryptographic Protocols.pdf2025-Jan-04 23:47:161.1Mapplication/pdf
Abe- Robust Distributed Multiplication without Interaction.pdf2025-Jan-04 23:47:16224.2Kapplication/pdf
Acciaio,Penner- Dynamic risk measures.pdf2025-Jan-04 23:47:16267.1Kapplication/pdf
Acerbi,Tasche- On the coherence of Expected Shortfall.pdf2025-Jan-04 23:47:16235.5Kapplication/pdf
Aclicmez,Schindler,Koc- Improving Brumley and Boneh Timing Attack on Unprotected SSL Implementations.pdf2025-Jan-04 23:47:16142.0Kapplication/pdf
Adams- Principled Parsing for Indentation-Sensitive Languages.pdf2025-Jan-04 23:47:16247.6Kapplication/pdf
Agarwal,Bhattacharya,Sen- Improved Algorithms for Uniform Partitions of Points.pdf2025-Jan-04 23:47:16202.9Kapplication/pdf
Aggarwal,Bursztein,Jackson,Boneh- An Analysis of Private Browsing Modes in Modern Browsers.pdf2025-Jan-04 23:47:16508.8Kapplication/pdf
Agrawal,Kayal,Saxena- PRIMES is in P.pdf2025-Jan-04 23:47:16195.2Kapplication/pdf
Ahmadi-Javid- Addendum to Entropic VaR.pdf2025-Jan-04 23:47:16294.9Kapplication/pdf
Ahmadi-Javid- An Information-Theoretic Approach to Constructing Coherent Risk Measures.pdf2025-Jan-04 23:47:16270.2Kapplication/pdf
Ahsan,Kundur- Practical Data Hiding in TCP-IP.pdf2025-Jan-04 23:47:16104.1Kapplication/pdf
Akhawe,Barth,Lam,Mitchell,Song- Towards a Formal Foundation of Web Security.pdf2025-Jan-04 23:47:16412.7Kapplication/pdf
Akinyele,Green,Hohenberger- Using SMT Solvers to Automate Design Tasks for Encryption and Signature Schemes.pdf2025-Jan-04 23:47:16732.9Kapplication/pdf
Akra,Bazzi- On the Solution of Linear Recurrence Equations.pdf2025-Jan-04 23:47:16107.0Kapplication/pdf
Al-Qahtani,Guzman,Arif,Tevoedjre,Pietrzynski- Comparing Selected Criteria of PL Java, PHP, Cpp, Haskell, AspectJ, Ruby, COBOL, Bash, and Scheme.pdf2025-Jan-04 23:47:162.9Mapplication/pdf
AlFardan,Bernstein,Paterson,Poettering,Schuldt- On the Security of RC4 in TLS.pdf2025-Jan-04 23:47:162.0Mapplication/pdf
Alamdari,Angelini,Chan,Di Battista,Frati,Lubiw,Patrignani,Roselli,Singla,Wilkinson- Morphing planar graph drawings with a polynomial number of steps.pdf2025-Jan-04 23:47:16544.6Kapplication/pdf
Alamdari,Chan,Grant,Lubiw,Pathak- Self-approaching graphs.pdf2025-Jan-04 23:47:16154.2Kapplication/pdf
Alatabbi,Daykin,Rahman,Smyth- Simple Linear Comparison of Strings in V-Order.pdf2025-Jan-04 23:47:16214.6Kapplication/pdf
Alexander,Baptista,Yan- Mean-variance Portfolio selection with 'at-risk' constraints and discrete distributions.pdf2025-Jan-04 23:47:16302.6Kapplication/pdf
Alexander,Coleman,Li- Derivative Portfolio Hedging Based on CVaR.pdf2025-Jan-04 23:47:16331.0Kapplication/pdf
Alexander,Coleman,Li- Minimizing CVaR and VaR for a Portfolio of Derivatives.pdf2025-Jan-04 23:47:16247.0Kapplication/pdf
Allodi,Massacci- How CVSS is DOSsing Your Patching Policy.pdf2025-Jan-04 23:47:16322.7Kapplication/pdf
Almgren,Chriss- Optimal Portfolios from Ordering Information.pdf2025-Jan-04 23:47:16511.7Kapplication/pdf
Alon,Demaine,Hajiaghayi,Leighton- Basic Network Creation Games.pdf2025-Jan-04 23:47:16380.7Kapplication/pdf
Alon,Shpilka,Umans- On Sunflowers and Matrix Multilpication.pdf2025-Jan-04 23:47:16669.2Kapplication/pdf
Alon- Combinatorial Nullstellensatz.pdf2025-Jan-04 23:47:16240.0Kapplication/pdf
Alonso,Sur- Owning Bad Guys Using JavaScript Botnets.pdf2025-Jan-04 23:47:161.4Mapplication/pdf
Alstrup,Brodal,Rauhe- Optimal Static Range Reporting in One Dimension.ps2025-Jan-04 23:47:16310.0Ktext/plain
Andem- A Cryptanalysis of the Tiny Encryption Algorithm.pdf2025-Jan-04 23:47:162.0Mapplication/pdf
Andergassen,Sereno- Valuation of N-stage Investments Under Jump-Diffusion Processes.pdf2025-Jan-04 23:47:16532.0Kapplication/pdf
Andersson,Mausser,Rosen,Uryasev- Credit risk optimization with Conditional VaR criterion.pdf2025-Jan-04 23:47:1699.2Kapplication/pdf
Andrade,Odean,Lin- Bubbling with Excitement.pdf2025-Jan-04 23:47:16668.1Kapplication/pdf
Ang,Liu- Risk, Return, and Dividends.pdf2025-Jan-04 23:47:16341.6Kapplication/pdf
Ang,Sorensen- Risks, Returns, and Optimal Holdings of Private Equity.pdf2025-Jan-04 23:47:161.3Mapplication/pdf
Ang- Dynamic Portfolio Choice.pdf2025-Jan-04 23:47:16522.3Kapplication/pdf
Angiuli,Maurer- An expressive type system for binary code.pdf2025-Jan-04 23:47:16356.0Kapplication/pdf
Antipa,Brown,Menezes,Struik,Vanstone- Validation of Elliptic Curve Public Keys.pdf2025-Jan-04 23:47:16210.4Kapplication/pdf
Antonakakis,Demar,Stevens,Dagon- Unveiling the Network Criminal Infrastructure of TDSS-TDL4.pdf2025-Jan-04 23:47:1612.5Mapplication/pdf
Apa,Hollman- Compromising Industrial Facilities from 40 Miles Away.pdf2025-Jan-04 23:47:165.9Mapplication/pdf
Appel- SSA is Functional Programming.pdf2025-Jan-04 23:47:16388.2Kapplication/pdf
Argyros,Kiayias- Randomness Attacks Against PHP Applications.pdf2025-Jan-04 23:47:16459.2Kapplication/pdf
Armstrong- Making reliable distributed systems in the presence of software errors.pdf2025-Jan-04 23:47:16839.1Kapplication/pdf
Arora,Barak,Brunnermeier,Ge- Computational Complexity and Information Asymmetry in Financial Products.pdf2025-Jan-04 23:47:16486.9Kapplication/pdf
Arora- Probabilistics Checking of Proofs and Hardness of Approximation Problems.pdf2025-Jan-04 23:47:16949.4Kapplication/pdf
Arrow- A Difficulty in the Concept of Social Welfare.pdf2025-Jan-04 23:47:16781.4Kapplication/pdf
Artzner,Delbaen,Eber,Heath,Ku- Coherent Multiperiod Risk Adjusted Values and Bellman's Principle.pdf2025-Jan-04 23:47:16458.4Kapplication/pdf
Artzner,Delbaen,Eber,Heath,Ku- Coherent Multiperiod Risk Measurement.pdf2025-Jan-04 23:47:16213.0Kapplication/pdf
Artzner,Delbaen,Eber,Heath- Coherent Measures of Risk.pdf2025-Jan-04 23:47:16249.1Kapplication/pdf
Artzner,Delbaen,Eber,Heath- Multiperiod Risk and Coherent Multiperiod Risk Measurement.pdf2025-Jan-04 23:47:16158.1Kapplication/pdf
Asano,Demaine,Demaine,Uehara- NP-completeness of generalized Kaboozle.pdf2025-Jan-04 23:47:161.0Mapplication/pdf
Asanovic,Bodik,Demmel,Keaveny,Keutzer,Kubiatowicz,Lee,Morgan,Necula,Patterson,et al- The Parallel Computing Laboratory at UC Berkeley.pdf2025-Jan-04 23:47:16389.6Kapplication/pdf
Asanovic,Bodik,Demmel,Keaveny,Keutzer,Kubiatowicz,Morgan,Patterson,Sen,Wawrzynek,Wessel,Yelick- A View of the Parallel Computing Landscape.pdf2025-Jan-04 23:47:177.3Mapplication/pdf
Ashcraft,Engler- Using Programmer-Written Compiler Extensions to Catch Security Holes.pdf2025-Jan-04 23:47:17391.3Kapplication/pdf
Asrigo,Litty,Lie- Using VMM-Based Sensors to Monitor Honeypots.pdf2025-Jan-04 23:47:17195.3Kapplication/pdf
Atkey,Ghani,Johann- A Relationally Parametric Model of Dependent Type Theory.pdf2025-Jan-04 23:47:17311.5Kapplication/pdf
Atkey- From Parametricity to Conservation Laws, via Noether's Theorem.pdf2025-Jan-04 23:47:17287.9Kapplication/pdf
Atkin,Bernstein- Prime Sieves Using Binary Quadratic Forms.pdf2025-Jan-04 23:47:17165.7Kapplication/pdf
Attack Research- MetaPhish.pdf2025-Jan-04 23:47:17569.3Kapplication/pdf
Au,Zhou,Huang,Gill,Lie- A Look at SmartPhone Permission Models.pdf2025-Jan-04 23:47:17357.9Kapplication/pdf
Augustsson- A Compiler for Lazy ML.pdf2025-Jan-04 23:47:17610.9Kapplication/pdf
Aumann,Rabin- Information Theoretically Secure Communication in the Limited Storage Space Model.pdf2025-Jan-04 23:47:17212.0Kapplication/pdf
Aumasson,Meier- Zero-sum distinguishers for reduced KECCAK-f and for the core functions of Luffa and Hamsi.pdf2025-Jan-04 23:47:1786.2Kapplication/pdf
Auriemma,Derrante- Owning Render Farms via NVIDIA Mental Ray.pdf2025-Jan-04 23:47:17876.3Kapplication/pdf
Ausin,Lopes- Time-varying joint distribution through copulas.pdf2025-Jan-04 23:47:172.6Mapplication/pdf
Avgerinos,Cha,Lim,Brumley- AEG Automatic Exploit Generation.pdf2025-Jan-04 23:47:17344.3Kapplication/pdf
Awodey,Gambino,Sojakova- Inductive Types in homotopy type theory.pdf2025-Jan-04 23:47:17246.9Kapplication/pdf
Awodey,Warren- Homotopy theoretic models of identity types.pdf2025-Jan-04 23:47:17122.5Kapplication/pdf
Awodey- Type Theory and Homotopy.pdf2025-Jan-04 23:47:17283.9Kapplication/pdf
Babic,Martignoni,McCamant,Song- Statically-Directed Dynamic Automated Test Generation.pdf2025-Jan-04 23:47:17170.7Kapplication/pdf
Babic,Reynaud,Song- Malware Analysis with Tree Automata Inference.pdf2025-Jan-04 23:47:17403.2Kapplication/pdf
Bachelier- The Theory of Speculation.pdf2025-Jan-04 23:47:17379.7Kapplication/pdf
Balakrishnan,Christodorescu,Ganapathy,Giffin,Rubin,Wang,Jha,Miller,Reps- Analysis of COTS for Security Vulnerability Remediation.pdf2025-Jan-04 23:47:17164.8Kapplication/pdf
Balasubramaniyan,Garcia-Fernandez,Isacoff,Spafford,Zamboni- An Architecture for Intrusion Detection using Autonomous Agents.pdf2025-Jan-04 23:47:17223.6Kapplication/pdf
Balbas,Garrido,Mayoral- Properties of Distortion Risk Measures.pdf2025-Jan-04 23:47:17423.3Kapplication/pdf
Ball,Bartov- How naive is the stock market's use of earnings information.pdf2025-Jan-04 23:47:170.9Mapplication/pdf
Ball- The earnings-price anomaly.pdf2025-Jan-04 23:47:171.9Mapplication/pdf
Banterle,Giacobazzi- A Fast Implementation of the Octagon Abstract Domain on Graphics Hardware.pdf2025-Jan-04 23:47:17516.3Kapplication/pdf
Bar-Anan,Wilson,Gilbert- The feeling of uncertainty intensifies affective reactions.pdf2025-Jan-04 23:47:1770.4Kapplication/pdf
Barak,Garg,Kalai,Paneth,Sahai- Protecting Obfuscation Against Algebraic Attacks.pdf2025-Jan-04 23:47:17511.4Kapplication/pdf
Barak,Shiloh- The MOSIX Cluster OS for High-Performance Computing on Linux Clusters, Multi-Clusters and Clouds.pdf2025-Jan-04 23:47:1769.1Kapplication/pdf
Barak,Shiloh- The VirtualCL(VCL) Cluster Platform.pdf2025-Jan-04 23:47:1758.6Kapplication/pdf
Barbay,He,Munro,Satti- Succinct Indexes dor Strings, Binary Relations and Multilabeled Trees.pdf2025-Jan-04 23:47:17301.0Kapplication/pdf
Barbeau,Hall,Kranakis- Detecting Impersonation Attacks in Future Wireless and Mobile Networks.pdf2025-Jan-04 23:47:17374.8Kapplication/pdf
Barber,Heath,Odean- Reason-based Choice Among Group and Individual Investors in the Stock Market.pdf2025-Jan-04 23:47:17141.4Kapplication/pdf
Barber,Lee,Liu,Odean- Do Day Traders Rationally Learn About Their Ability.pdf2025-Jan-04 23:47:171.2Mapplication/pdf
Barber,Lyon- Detecting long-run abnormal stock returns.pdf2025-Jan-04 23:47:171.7Mapplication/pdf
Barber,Odean- Gender, Overconfidence and Common Stock Investment.pdf2025-Jan-04 23:47:17223.6Kapplication/pdf
Barber,Odean- The Courage of Misguided Convictions.pdf2025-Jan-04 23:47:17205.5Kapplication/pdf
Barber,Odean- The Internet and the Investor.pdf2025-Jan-04 23:47:17160.0Kapplication/pdf
Barber,Odean- Too Many Cooks Spoil the Profits.pdf2025-Jan-04 23:47:17154.8Kapplication/pdf
Barber,Strahilevitz,Odean- Once Burned, Twice Shy.pdf2025-Jan-04 23:47:17625.1Kapplication/pdf
Barber,Zhu,Odean- Systematic Noise.pdf2025-Jan-04 23:47:17368.7Kapplication/pdf
Bard- A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL.pdf2025-Jan-04 23:47:17129.9Kapplication/pdf
Barham,Dragovic,Fraser,Hand,Harris,Ho,Neugebauer,Pratt,Warfield- Xen and the Art of Virtualization.pdf2025-Jan-04 23:47:17284.7Kapplication/pdf
Barisani,Bianco- Fully Arbitrary 802.3 packet injection Maximizing the Ethernet attack surface.pdf2025-Jan-04 23:47:1743.5Kapplication/pdf
Barker,Hannay,Szewczyk- Using traffic analysis to identify The Second Generation Onion Router.pdf2025-Jan-04 23:47:17585.7Kapplication/pdf
Baron,El Defrawy,Lampkins,Ostrovsky- How to Withstand Mobile Virus Attacks, Revisited.pdf2025-Jan-04 23:47:17585.0Kapplication/pdf
Barth,Caballero,Song- Secure Content Sniffing for Web Browsers or How to Stop Papers from Reviewing Themselves.pdf2025-Jan-04 23:47:17619.0Kapplication/pdf
Barthe,Fournet,Gregoire,Strub,Swamy,Beguelin- Probabilistic Relational Verification for Cryptographic Implementations.pdf2025-Jan-04 23:47:17434.9Kapplication/pdf
Bartholomy,Greenlee,Sylvia- The need to move toward virtualized and more resilient disaster-recovery architectures.pdf2025-Jan-04 23:47:175.1Mapplication/pdf
Bau,Mayer,Paskov,Mitchell- A Promising Direction for Web Tracking Countermeasures.pdf2025-Jan-04 23:47:17253.2Kapplication/pdf
Bauer- Frist Steps in Synthetic Computability Theory.pdf2025-Jan-04 23:47:17379.5Kapplication/pdf
Baum,Boneh- Running dynamic programming algorithms on a DNA computer.ps.gz2025-Jan-04 23:47:1764.2Ktext/plain
Bauwens,Omrane,Rengifo- Intradaily dynamic portfolio selection.pdf2025-Jan-04 23:47:17798.7Kapplication/pdf
Bayer,Friz,Laurence- On the pdf of baskets.pdf2025-Jan-04 23:47:17256.6Kapplication/pdf
Beaulieu,Shors,Smith,Treatman-Clark,Weeks,Wingers- The SIMON and SPECK families of Lightweight Block Ciphers.pdf2025-Jan-04 23:47:17278.5Kapplication/pdf
Beckers,De Samblanx,De Smedt,Goedeme,Struyf,Vennekens- Parallel SAT-solving with OpenCL.pdf2025-Jan-04 23:47:17165.2Kapplication/pdf
Beimel,Malkin,Micali- The All-or-Nothing Nature of Two-Party Secure Computation.pdf2025-Jan-04 23:47:17241.0Kapplication/pdf
Bellare,Miner- A Forward-Secure Digital Signature Scheme.pdf2025-Jan-04 23:47:17237.4Kapplication/pdf
Bender,Castagnoli- On the Implementation of Elliptic Curve Cryptosystems.pdf2025-Jan-04 23:47:174.1Mapplication/pdf
Benger,de Pol,Smart,Yarom- A small amount of side channel can go a long way.pdf2025-Jan-04 23:47:17174.4Kapplication/pdf
Bengio,Thibodeau-Laufer- Deep Generative Stochastic Networks Trainable by Backprop.pdf2025-Jan-04 23:47:171.3Mapplication/pdf
Bengio,Yao,Alain,Vincent- Generalized Denoising Auto-Encoders as Generative Models.pdf2025-Jan-04 23:47:17754.2Kapplication/pdf
Berkovich,Bonakdarpour,Fischmeister- GPU-based Runtime Verification.pdf2025-Jan-04 23:47:17388.5Kapplication/pdf
Bernardi,Gayraud,Petrella- Bayesian Inference for CoVaR.pdf2025-Jan-04 23:47:171.3Mapplication/pdf
Bernardy,Clasessen- Efficient Divide-and-Conquer Parsing of Practical CFLs.pdf2025-Jan-04 23:47:17406.8Kapplication/pdf
Bernstein- Salsa20 Specification.pdf2025-Jan-04 23:47:1773.5Kapplication/pdf
Bernstein- The Poly1305-AES message-authentication code.pdf2025-Jan-04 23:47:172.0Mapplication/pdf
Berthier- Advanced Honeypot Architecture for Network Threats Quantification.pdf2025-Jan-04 23:47:172.8Mapplication/pdf
Bethencourt,Song,Waters- Analysis-Resistant Malware.pdf2025-Jan-04 23:47:17232.4Kapplication/pdf
Beyene,Chaudhuri,Popeea,Rybalchenko- A Constraint-Based Approach to Solving Games on Infinite Graphs.pdf2025-Jan-04 23:47:17281.0Kapplication/pdf
Biedl,Chan,Demaine,Fleischei,Golin,King,Munro- Fun-Sort or the chaos of unordered binary search.pdf2025-Jan-04 23:47:17205.4Kapplication/pdf
Biehl,Meyer,Muller- Differential Fault Attacks on Elliptic Curve Cryptosystems.pdf2025-Jan-04 23:47:17225.9Kapplication/pdf
Bielecki,Pliska- Risk-Sensitive Dynamic Asset Management.pdf2025-Jan-04 23:47:17146.3Kapplication/pdf
Bittau,Belay,Mashtizadeh,Mazieres,Boneh- Hacking Blind.pdf2025-Jan-04 23:47:17475.4Kapplication/pdf
Black- The Holes in Black-Scholes.pdf2025-Jan-04 23:47:17655.4Kapplication/pdf
Blasing,Batyuk,Schmidt,Camtepe,Albayrak- An Android Application Sandbox System for Suspicious Software Detection.PDF2025-Jan-04 23:47:17184.2Kapplication/pdf
Blaze,Feigenbaum,Ioannidis,Keromytis- The Role of Trust Management in Distributed Systems Security.pdf2025-Jan-04 23:47:17273.1Kapplication/pdf
Blaze- A Cruptographic File System for Unix.pdf2025-Jan-04 23:47:17933.2Kapplication/pdf
Blelloch,Fineman,Gibbons,Shun- Internally Deterministic Parallel Algorithms Can Be Fast.pdf2025-Jan-04 23:47:17270.7Kapplication/pdf
Blelloch,Harper- Cache and IO Efficient Functional Algorithms.pdf2025-Jan-04 23:47:17269.3Kapplication/pdf
Blellock,Maggs- Parallel Algorithms.pdf2025-Jan-04 23:47:17437.8Kapplication/pdf
Bodin,Chargueraud,Filaretti,Gardner,Maffeis,Naudziuniene,Schmitt,Smith- A Trusted Mechanised Javascript Specification.pdf2025-Jan-04 23:47:17371.9Kapplication/pdf
Bollerslev,Engle,Wooldridge- A CAPM with Time-varying Covariances.pdf2025-Jan-04 23:47:171.0Mapplication/pdf
Boneh,Dunworth,Lipton,Sgall- On the computational power of DNA.ps.gz2025-Jan-04 23:47:17162.2Ktext/plain
Boneh,Dunworth,Lipton- Breaking DES using a molecular computer.ps.gz2025-Jan-04 23:47:17140.1Ktext/plain
Boneh,Durfee,Howgrave-Graham- Factoring N=p^r q for Large r.pdf2025-Jan-04 23:47:17221.2Kapplication/pdf
Boneh,Franklin- An Efficient Public Key Traitor Tracing Scheme.pdf2025-Jan-04 23:47:17332.9Kapplication/pdf
Boneh,Lipton- Making DNA computers error resistant.ps.gz2025-Jan-04 23:47:1761.6Ktext/plain
Boneh- Learning using Group Representations.ps.gz2025-Jan-04 23:47:17187.5Ktext/plain
Boneh- Twenty Years of Attacks on the RSA Cryptosystem.pdf2025-Jan-04 23:47:17303.4Kapplication/pdf
Bonfante,Kaczmarek,Marion- On abstract computer virology from a recursion-theoretic perspective.pdf2025-Jan-04 23:47:17243.1Kapplication/pdf
Bonneau- Guessing human-chosen secrets.pdf2025-Jan-04 23:47:171.9Mapplication/pdf
Borghoff,Knudsen,Leander,Thomsen- Slender-Set Differential Cryptanalysis.pdf2025-Jan-04 23:47:17419.7Kapplication/pdf
Bos,Dudeanu,Jetchev- Collision Boudns for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms.pdf2025-Jan-04 23:47:17395.9Kapplication/pdf
Bos,Halderman,Heninger,Moore,Naehrig,Wustrow- Elliptic Curve Cryptography in Practice.pdf2025-Jan-04 23:47:17584.3Kapplication/pdf
Bos,Kaihara,Kleinjung,Lenstra,Montgomery- Solving a 112-bit Prime Elliptic Curve Discrete Logarithm Problem on Game Consoles using Sloppy Reduction.pdf2025-Jan-04 23:47:17512.0Kapplication/pdf
Bos,Lauter,Loftus,Naehrig- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme.pdf2025-Jan-04 23:47:17466.1Kapplication/pdf
Bos- Low-Latency Elliptical Curve Scalar Multiplication.pdf2025-Jan-04 23:47:17398.3Kapplication/pdf
Bose,Morrison- Optimal Point Set Partitioning using Rigid Motion Star Placement.pdf2025-Jan-04 23:47:17284.9Kapplication/pdf
Boyko- On the Security Properties of OAEP as an All-or-Nothing Transform.pdf2025-Jan-04 23:47:17211.7Kapplication/pdf
Boyle,Hardy,Vorst- Life after VaR.pdf2025-Jan-04 23:47:17391.2Kapplication/pdf
Boyle,Imai,Tan- Computation of optimal portfolios using simulation-based dimension reduction.pdf2025-Jan-04 23:47:171.7Mapplication/pdf
Bozga,Iosif,Konecny- Safety Problems are NP-complete for Flat Integer Programs with Octogonal Loops.pdf2025-Jan-04 23:47:17496.7Kapplication/pdf
Bracha,Cook- Mixin-based Inheritance.pdf2025-Jan-04 23:47:17260.9Kapplication/pdf
Brakerski,Gentry,Halevi- Packed Ciphertexts in LWE-Based Homomorphic Encryption.pdf2025-Jan-04 23:47:17256.4Kapplication/pdf
Branavan,Silver,Barzilay- Learning to Win by Reading Manuals in a Monte-Carlo Framework.pdf2025-Jan-04 23:47:171.6Mapplication/pdf
Brausen,Hayward,Muller,Qadir,Spies- Blunder Cost in Go and Hex.pdf2025-Jan-04 23:47:17162.4Kapplication/pdf
Bressoud,Schneider- Hypervisor-Based Fault-Tolerence.pdf2025-Jan-04 23:47:171.8Mapplication/pdf
Breuer,Csiszar- Measuring Distribution Model Risk.pdf2025-Jan-04 23:47:171.2Mapplication/pdf
Brewer- Towards Robust Distributed Systems.pdf2025-Jan-04 23:47:17223.4Kapplication/pdf
Brickell,Gemmell,Kravitz- Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change.pdf2025-Jan-04 23:47:17255.0Kapplication/pdf
Bricker,Borokhovich,Simkins- The Impact of Accounting Research on Finance.pdf2025-Jan-04 23:47:17159.5Kapplication/pdf
Bringer,Chabanne,Lescuyer,Patey- Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents.pdf2025-Jan-04 23:47:17480.5Kapplication/pdf
Brodnik- Computation of the Least Significant Bit.pdf2025-Jan-04 23:47:17185.1Kapplication/pdf
Brown,Epstein,Murdock,Fin- Tools and Methods for Building Watson.pdf2025-Jan-04 23:47:171.1Mapplication/pdf
Brubaker,Jana,Ray,Khurshid,Shmatikov- Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL-TLS Implementations.pdf2025-Jan-04 23:47:17292.4Kapplication/pdf
Brumley,Boneh- Remote Timing Attacks are Practical.pdf2025-Jan-04 23:47:171.1Mapplication/pdf
Brumley,Caballero,Liang,Newsome,Song- Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation.pdf2025-Jan-04 23:47:17161.0Kapplication/pdf
Brumley,Hartwig,Liang,Newsome,Song,Yin- Automatically Identifying Trigger-based Behavior in Malware.pdf2025-Jan-04 23:47:17177.1Kapplication/pdf
Brumley,Newsome,Song,Wang,Jha- Towards Automatic Generation of Vulnerability Signatures.pdf2025-Jan-04 23:47:17240.4Kapplication/pdf
Brumley,Wang,Jha,Song- Creating Vulnerability Signatures Using Weakest Pre-conditions.pdf2025-Jan-04 23:47:17223.8Kapplication/pdf
Bruschi,Martignoni,Monga- Detecting self-mutating malware using control-flow graph matching.pdf2025-Jan-04 23:47:1798.5Kapplication/pdf
Bruschi,Martignoni,Monga- Using Code Normalization for Fighting Self-Mutating Malware.pdf2025-Jan-04 23:47:17120.6Kapplication/pdf
Bruss,Delbaen- A Central Limit Theorem for the Optimal Selection Process for Monotone Subsequences of Maximum Expected Length.pdf2025-Jan-04 23:47:17397.5Kapplication/pdf
Bruss,Delbaen- New Reulsts on Optimal Rules for Selecting Monotone Subsequences of Maximal Length.pdf2025-Jan-04 23:47:17234.8Kapplication/pdf
Budiu,Galenson,Plotkin- The Compiler Forest.pdf2025-Jan-04 23:47:17351.0Kapplication/pdf
Budiu,Goldstein- Compiling Application-Specific Hardware.pdf2025-Jan-04 23:47:17154.1Kapplication/pdf
Budiu- Spatial Computation.pdf2025-Jan-04 23:47:172.5Mapplication/pdf
Budzynowski,Heiser- The con Neumann architecture is due for retirement.pdf2025-Jan-04 23:47:18231.5Kapplication/pdf
Bugiel,Heuser,Sadeghi- Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies.pdf2025-Jan-04 23:47:182.2Mapplication/pdf
Bugnion,Chipounov,Candea- Lightweight Snapshots and System-level Backtracking.pdf2025-Jan-04 23:47:18122.5Kapplication/pdf
Buhlmann,Delbaen,Embrechts,Shiryaev- No-Arbitrage, Change of Measure, and Conditional Esscher Transforms.pdf2025-Jan-04 23:47:18214.8Kapplication/pdf
Burroughs,Engebretson,Pauli- Attack Traffic Libraries for Testing and Teaching Intrusion Detection Systems.pdf2025-Jan-04 23:47:18225.7Kapplication/pdf
Butterworth,Kallenberg,Kovah,Herzog- Problems with the Static Root of Trust for Measurement.pdf2025-Jan-04 23:47:18186.1Kapplication/pdf
Caballero,Johnson,McCamant,Song- Binary Code Extraction and Interface Identification for Security Applications.pdf2025-Jan-04 23:47:18421.3Kapplication/pdf
Caballero,Liang,Poosankam,Song- Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.pdf2025-Jan-04 23:47:18163.8Kapplication/pdf
Cadar,Dunbar,Engler- KLEE- Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.pdf2025-Jan-04 23:47:18223.3Kapplication/pdf
Caires,Seco- The Type Discipline of Behavioral Separation.pdf2025-Jan-04 23:47:18512.0Kapplication/pdf
Camenisch,Michels- Separability and Efficiency for Generic Group Signature Schemes.pdf2025-Jan-04 23:47:18325.1Kapplication/pdf
Campbell,Giglio,Polk,Turley- An Intertemporal CAPM with Stochastic Volatility.pdf2025-Jan-04 23:47:18606.1Kapplication/pdf
Campbell,Huisman,Koedijk- Optimal portfolio selection in a VaR framework.pdf2025-Jan-04 23:47:18185.1Kapplication/pdf
Campbell,Shiller- The Dividend-Price Ratio and Expectations of Future Dividends and Discount Factors.pdf2025-Jan-04 23:47:181.7Mapplication/pdf
Campbell- Local System Security via SSHD Instrumentation.pdf2025-Jan-04 23:47:18539.6Kapplication/pdf
Canakoglu,Ozekici- Portfolio selection in stochastic markets with HARA utility functions.pdf2025-Jan-04 23:47:18388.4Kapplication/pdf
Canetti,Gennaro,Jarecki,Krawczyk,Rabin- Adaptive Security for Threshold Cryptosystems.pdf2025-Jan-04 23:47:18263.9Kapplication/pdf
Cardinal,Fiorini,Joret,Jungers,Munro- Sorting under Partial Information (without the Ellipsoid Algorithm).pdf2025-Jan-04 23:47:18634.5Kapplication/pdf
Carenini,Murray,Ng- Methods for Mining and Summarizing Text Conversations.pdf2025-Jan-04 23:47:182.9Mapplication/pdf
Carlini,Felt,Wagner- An Evaluation of the Google Chrome Extension Security Architecture.pdf2025-Jan-04 23:47:18186.8Kapplication/pdf
Carr,Madan- Option Valuation using FFT.pdf2025-Jan-04 23:47:18121.9Kapplication/pdf
Carr,Wu- A Tale of Two Indices.pdf2025-Jan-04 23:47:18181.8Kapplication/pdf
Cash,Green,Hohenberger- New Definitions and Separations for Circular Security.pdf2025-Jan-04 23:47:18319.8Kapplication/pdf
Castelluccia,Durmuth,Perito- Adaptive Password-Strength Meters from Markov Models.pdf2025-Jan-04 23:47:18547.7Kapplication/pdf
Cavallaro,Kruegel,Vigna- Mining the Network Behavior of Bots.pdf2025-Jan-04 23:47:18203.8Kapplication/pdf
Celikyurt,Ozekici- Multiperiod portfolio optimization models in stochastic markets using the mean-variance approach.pdf2025-Jan-04 23:47:18277.7Kapplication/pdf
Cesare- Bugalyze-dot-com- Detecting Bugs Using Decompilation and Data Flow Analysis.pdf2025-Jan-04 23:47:18718.2Kapplication/pdf
Cha,Avgerinos,Rebert,Brumley- Unleashing MAYHEM on Binary Code.pdf2025-Jan-04 23:47:18414.9Kapplication/pdf
Chan,Chen- A space-efficient algorithm for segment intersection.pdf2025-Jan-04 23:47:18121.0Kapplication/pdf
Chan,Durocher,Skala,Wilkinson- Linear-space data structures for range minority query in arrays.pdf2025-Jan-04 23:47:18303.4Kapplication/pdf
Chan,Hoffmann,Kiazyk,Lubiw- Minimum length embedding of planar graphs at fixed vertex locations.pdf2025-Jan-04 23:47:18720.0Kapplication/pdf
Chan,Kamousi,Suri- Closest pair and the post office problem for stochastic points.pdf2025-Jan-04 23:47:18405.5Kapplication/pdf
Chan,Kamousi,Suri- Stochastic MST in Euclidean Spaces.pdf2025-Jan-04 23:47:181.6Mapplication/pdf
Chan,Lippmann- Machine Learning for Computer Security.pdf2025-Jan-04 23:47:1855.0Kapplication/pdf
Chan,Munro,Raman- Faster, space-efficient selection algorithms in read-only memory for integers.pdf2025-Jan-04 23:47:18242.2Kapplication/pdf
Chan- A dynamic data structure for 3-d convex hulls and 2-d nearest neighbour queries.pdf2025-Jan-04 23:47:18293.7Kapplication/pdf
Chan- All-Pairs Shortest Paths for Unweighted Undirected Graphs in o(mn) Time.pdf2025-Jan-04 23:47:18181.7Kapplication/pdf
Chan- Backwards analysis of the Karger-Klein-Tarjan algorithm for MST.pdf2025-Jan-04 23:47:18201.7Kapplication/pdf
Chan- Comparison-Based Time-Space Lower Bounds for Selection.pdf2025-Jan-04 23:47:18132.5Kapplication/pdf
Chan- Klee's measure problem made easy.pdf2025-Jan-04 23:47:18339.6Kapplication/pdf
Chan- More algorithms for all-pairs shortest path in weighted graphs.pdf2025-Jan-04 23:47:18318.3Kapplication/pdf
Chan- Three Problems about Dynamic Convex Hulls.pdf2025-Jan-04 23:47:18512.0Kapplication/pdf
Chandhana,Anita- Improving Security in Anonymizing Networks using a Privacy Enhancing System.pdf2025-Jan-04 23:47:18271.9Kapplication/pdf
Chang,Felleisen- Profiling For Laziness.pdf2025-Jan-04 23:47:18411.5Kapplication/pdf
Chang,Perlner,Burr,Turan,Kelsey,Paul,Bassham- Third-Round Report of the SHA-3 Cryptographic Hash Algorithm Competition.pdf2025-Jan-04 23:47:185.4Mapplication/pdf
Chang- Laziness by Need.pdf2025-Jan-04 23:47:18733.4Kapplication/pdf
Chari,Jutla,Rao,Rohatgi- Towards Sound Approaches to Counteract Power-Analysis Attacks.pdf2025-Jan-04 23:47:18375.6Kapplication/pdf
Chastuhin,Bolshev- Practical eploiting of MDX injections.pdf2025-Jan-04 23:47:18949.7Kapplication/pdf
Chaves,Hsu,Li,Shakernia- Risk Parity Portfolio vs Other Asset Allocation Heuristic Portfolios.pdf2025-Jan-04 23:47:181.6Mapplication/pdf
Chazelle- A Minimum Spanning Tree Algorithm with Inverse-Ackermann Type Complexity.pdf2025-Jan-04 23:47:18313.2Kapplication/pdf
Checkoway,Davi,Dmitienko,Sadeghi,Shacham,Winandy- ROP without Returns.pdf2025-Jan-04 23:47:18569.3Kapplication/pdf
Checkoway,Fredrikson,Niederhagen,Green,Lange,Ristenpart,Bernstein,Maskiewicz,Shacham- On the Practical Exploitability of Dual EC in TLS Implementations.pdf2025-Jan-04 23:47:18358.8Kapplication/pdf
Cheeseman,Kanefsky,Taylor- Where the really hard problems are.pdf2025-Jan-04 23:47:18211.2Kapplication/pdf
Cheeseman- In Defense of Probability.pdf2025-Jan-04 23:47:18138.8Kapplication/pdf
Chen,Erwig- Counter-Factual Typing for Debugging Type Errors.pdf2025-Jan-04 23:47:18356.5Kapplication/pdf
Chen,Liu,Hwang,Xie- First Step Towards Automatic Correction of Firewall Policy Faults.pdf2025-Jan-04 23:47:18358.3Kapplication/pdf
Chen,Qi,Bai,Lin,Carbonell- Sparse Latent Semantic Analysis.pdf2025-Jan-04 23:47:181.0Mapplication/pdf
Cheong,Buckley,Zurbruegg- Value Weighted vs Equally Weighted Portfolios.pdf2025-Jan-04 23:47:18344.3Kapplication/pdf
Cheridito,Delbaen,Kupper- Coherent and convex risk measures for bounded cadlag processes.pdf2025-Jan-04 23:47:18482.5Kapplication/pdf
Chicheportiche,Bouchaud- Some applications of first-passage ideas to finance.pdf2025-Jan-04 23:47:18652.1Kapplication/pdf
Chien,Chang- Deep Learning for Topical Words and Thematic Sentences.pdf2025-Jan-04 23:47:18401.3Kapplication/pdf
Chilimbi,Hauwirth- Low-Overhead Memory Leak Detection Using Adaptive Statistical Profiling.pdf2025-Jan-04 23:47:18155.3Kapplication/pdf
Cho,Babic,Shin,Song- Inference and Analysis of Formal Models of Botnet Command and Control.pdf2025-Jan-04 23:47:18498.2Kapplication/pdf
Choi,Varian- Predicting the Present with Google Trends.pdf2025-Jan-04 23:47:18313.9Kapplication/pdf
Christodorescu,Jha,Kruegel- Mining Specifications of Malicious Behavior.pdf2025-Jan-04 23:47:18353.3Kapplication/pdf
Christopher,Procter,Anderson- The Nachos Instructional OS.pdf2025-Jan-04 23:47:181.8Mapplication/pdf
Chu-Carroll,Brown,Lally,Murdock- Identifying implicit relationships.pdf2025-Jan-04 23:47:18171.2Kapplication/pdf
Chung,Ostrovsky,Pass,Venkitasubramaniam,Visconti- 4 Round Resettably-Sound Zero Knowledge.pdf2025-Jan-04 23:47:18407.5Kapplication/pdf
Church- A Set of Postulates for the Foundation of Logic.pdf2025-Jan-04 23:47:181.5Mapplication/pdf
Church- An Unsolvable Problem of Elementary Number Theory.pdf2025-Jan-04 23:47:18501.5Kapplication/pdf
Cifuentes- Reverse Compilation Techniques.pdf2025-Jan-04 23:47:182.3Mapplication/pdf
Claude,Munro- Adaptive Data Structures for Permutations and Binary Relations.pdf2025-Jan-04 23:47:18177.6Kapplication/pdf
Clayton- Anonymity and traceability in cyberspace.pdf2025-Jan-04 23:47:181.6Mapplication/pdf
Clune,Goldsby,Ofria,Pennock- Selective pressures for accurate altruism targeting.pdf2025-Jan-04 23:47:18437.6Kapplication/pdf
Clune,Mouret,Lipson- The evolutionary origins of modularity.pdf2025-Jan-04 23:47:181.1Mapplication/pdf
Clune,Pennock,Ofria,Lenski- Ontogeny tends to recapitulate phylogeny in digital organisms.pdf2025-Jan-04 23:47:18321.4Kapplication/pdf
Clune,Stanley,Pennock,Ofria- On the performance of indirect encoding across the continuum of regularity.pdf2025-Jan-04 23:47:183.5Mapplication/pdf
Clune- Evolving ANN with Generative Encodings inspired by developmental biology.pdf2025-Jan-04 23:47:184.5Mapplication/pdf
Coase- The Problem of Social Cost.pdf2025-Jan-04 23:47:185.3Mapplication/pdf
Coates,Huval,Wang,Wu,Ng,Catanzaro- Deep Learning with COTS HPC systems.pdf2025-Jan-04 23:47:18739.7Kapplication/pdf
Coates- Demystifying Unsupervised Feature Learning.pdf2025-Jan-04 23:47:187.4Mapplication/pdf
Coleman,Li,Patron- Total risk minimization using Monte-Carlo simulations.pdf2025-Jan-04 23:47:18606.3Kapplication/pdf
Colmenares,Bird,Cook,Pearce,Zhu,Shalf,Hofmeyr,Asanovic,Kubiatowicz- Resource Management in the Tessellation Manycore OS.pdf2025-Jan-04 23:47:18368.0Kapplication/pdf
Cooper- Easy Volatility Investing.pdf2025-Jan-04 23:47:181.0Mapplication/pdf
Coppersmith- Weakness in Quaternion Signatures.pdf2025-Jan-04 23:47:18136.8Kapplication/pdf
Corner,Noble- Zero-Interaction Authentication.pdf2025-Jan-04 23:47:18203.7Kapplication/pdf
Coron,Naccache,Stern- On the Security of RSA Padding.pdf2025-Jan-04 23:47:18265.6Kapplication/pdf
Corrigan-Gibbs,Wolinsky,Ford- Proactively Accountable Anonymous Messaging in Verdict.pdf2025-Jan-04 23:47:182.1Mapplication/pdf
Cox,Ingersoll,Ross- A Theory of the Term Structure of Interest Rates.pdf2025-Jan-04 23:47:182.0Mapplication/pdf
Cox,Ross- The Pricing of Options for Jump Processes.pdf2025-Jan-04 23:47:18429.9Kapplication/pdf
Crary,Harper- Syntactic Logical Relations for Polymorphic and Recursive Types.pdf2025-Jan-04 23:47:18393.2Kapplication/pdf
Crary- Higher-order Representation of Substructural Logics.pdf2025-Jan-04 23:47:18192.4Kapplication/pdf
Crosby,Riefi,Wallach- Opportunities and Limits of Remote Timing Attacks.pdf2025-Jan-04 23:47:18347.0Kapplication/pdf
Croson,Boles,Murnighan- Deception and Retribution in Repeated Ultimatum Bargaining.pdf2025-Jan-04 23:47:18168.2Kapplication/pdf
Croson,Buchan,Johnson- When do fair beliefs influence bargaining behaviour.pdf2025-Jan-04 23:47:1871.7Kapplication/pdf
Croson,Onculer- Rent-seeking for a risky rent.pdf2025-Jan-04 23:47:18354.3Kapplication/pdf
Cuarnieri,Schloesser,Bremer- Cuckoo Sandbox.pdf2025-Jan-04 23:47:18511.2Kapplication/pdf
Cui,Xu,Peinado,Chan- Tracking Rootkit Footprints with a Practical Memory Analysis System.pdf2025-Jan-04 23:47:18789.3Kapplication/pdf
Cutlip- SQL Injection to MIPS Overflows.pdf2025-Jan-04 23:47:181.0Mapplication/pdf
Cvitanic,Goukasian,Zapatero- Monte Carlo computation of optimal portfolios in complete markets.pdf2025-Jan-04 23:47:19164.7Kapplication/pdf
Czarlinska,Kundur- Towards characterizing the effectiveness of random mobility against actuation attacks.pdf2025-Jan-04 23:47:19882.5Kapplication/pdf
Dai,Wei,Zhang,Wang,Ding,Zou,Liang- A Framework to Eliminate Backdoors from Response Computable Authentication.pdf2025-Jan-04 23:47:19585.1Kapplication/pdf
Daigniere- TLS Secrets.pdf2025-Jan-04 23:47:19349.5Kapplication/pdf
Dalang,Morton,Willinger- Equivalent Martingale Measures and No-Arbitrage in Stochastic Securities Market Models.pdf2025-Jan-04 23:47:19674.3Kapplication/pdf
Dall,Nieh- KVM for ARM.pdf2025-Jan-04 23:47:19159.1Kapplication/pdf
Daniel,Honoroff,Miller- Engineering Heap Overflow Exploits with JavaScript.pdf2025-Jan-04 23:47:1966.1Kapplication/pdf
Danielsson,Jorgensen,Sarma,de Vries- Comparing downside risk measures for heavy tailed distributions.pdf2025-Jan-04 23:47:19100.9Kapplication/pdf
Danner,Defabbia-Kane,Krizanc,Liberatore- Effectiveness and Detection of DOS Attacks in Tor.pdf2025-Jan-04 23:47:19600.7Kapplication/pdf
Darwiche- Recursive Conditioning.ps2025-Jan-04 23:47:19622.9Ktext/plain
Das,Kramer- Self-Censorship on Facebook.pdf2025-Jan-04 23:47:19316.1Kapplication/pdf
Daskalakis,Goldberg,Papadimitriou- The Complexity of Computing a Nash Equilibrium.pdf2025-Jan-04 23:47:19377.9Kapplication/pdf
Davis,Pistorius- Explicit Solution to an Inverse first-passage time problem for Levy Processes.pdf2025-Jan-04 23:47:19359.9Kapplication/pdf
Davis,Tate,Okhravi,Grier,Overbye,Nicol- SCADA Cyber Security Testbed Development.pdf2025-Jan-04 23:47:192.1Mapplication/pdf
De Cesari,Espenlaub,Khurshed,Simkovic- The Effects of Ownership and Stock Liquidity on the Timing of Repurchase Transactions.pdf2025-Jan-04 23:47:191.1Mapplication/pdf
DeMott- Bypassing EMET 4.1.pdf2025-Jan-04 23:47:191.2Mapplication/pdf
Defence Academy of the UK- The Global Cyber Game.pdf2025-Jan-04 23:47:1912.7Mapplication/pdf
Dehne,Gotz- Practical Parallel Algorithms for MST.pdf2025-Jan-04 23:47:1961.6Kapplication/pdf
Del Lago,Petit- The Geometry of Types.pdf2025-Jan-04 23:47:19598.2Kapplication/pdf
Delbaen,Schachermayer- Arbitrage Possibilities in Bessel Processes and their Relations to Local Martingales.pdf2025-Jan-04 23:47:19146.3Kapplication/pdf
Delbaen,Schachermayer- The Existence of Absolutely Continuous Local Martingale Measures.pdf2025-Jan-04 23:47:19233.1Kapplication/pdf
Delbaen,Shirakawa- No Arbitrage Condition for Positive Diffusion Price Processes.pdf2025-Jan-04 23:47:19406.6Kapplication/pdf
Delbaen- Coherent Risk Measures on General Probability Spaces.pdf2025-Jan-04 23:47:19295.4Kapplication/pdf
Delbaen- Hedging bounded claims with bounded outcomes.pdf2025-Jan-04 23:47:19487.4Kapplication/pdf
Delbaen- Risk Measures or Measures that Describe Risk.pdf2025-Jan-04 23:47:19101.7Kapplication/pdf
Delbaen- The Structure of m-stable sets and in particular of the set of risk neutral measures.pdf2025-Jan-04 23:47:19661.7Kapplication/pdf
Demaine,Demaine,Eisenstat,Lubiw,Winslow- Algorithms for Solving Rubik's Cubes.pdf2025-Jan-04 23:47:19502.0Kapplication/pdf
Demaine,Demaine,Eppstein- Phutball Endgames are Hard.pdf2025-Jan-04 23:47:1972.6Kapplication/pdf
Demaine,Demaine,Harvey,Uehara,Uno,Uno- UNO is hard, even for a single player.pdf2025-Jan-04 23:47:19228.6Kapplication/pdf
Demaine,Hajiaghayi,Mohar- Approximation Algorithms via Contraction Decomposition.pdf2025-Jan-04 23:47:19239.0Kapplication/pdf
Demaine,Zadimoghaddam- Constant Price of Anarchy in Network Creation Games via Public Service Advertising.pdf2025-Jan-04 23:47:19312.8Kapplication/pdf
Demme,Maycock,Schmitz,Tang,Waksman,Sethumadhavan,Stolfo- On the Feasibility of Online Malware Detection with Performance Counters.pdf2025-Jan-04 23:47:191.1Mapplication/pdf
Denil,Shakibi,Dinh,Ranzato,de Freitas- Predicting Parameters in Deep Learning.pdf2025-Jan-04 23:47:19413.1Kapplication/pdf
Denning,Sacco- Timestamps in Key Distribution Protocols.pdf2025-Jan-04 23:47:19385.8Kapplication/pdf
Devet,Goldberg,Heninger- Optimally Robust Private Information Retrieval.pdf2025-Jan-04 23:47:19212.5Kapplication/pdf
Di Crescenzo,Ostrovsky- On Concurrent Zero-Knowledge with Pre-processing.pdf2025-Jan-04 23:47:19397.8Kapplication/pdf
Dickey- Multiple Hypergeometric Functions- Probabilistic Interpretations and Statistical Uses.pdf2025-Jan-04 23:47:191.6Mapplication/pdf
Dinaburg,Royal,Sharif,Lee- Malware Analysis via Hardware Virtualization Extensions.pdf2025-Jan-04 23:47:19360.3Kapplication/pdf
Dissegna,Logozzo,Ranzato- Tracing Compilation by Abstract Interpretation.pdf2025-Jan-04 23:47:19324.0Kapplication/pdf
Dmitrienko,Liebchen,Rossow,Sadeghi- On the (In)Security of Mobile Two-Factor Authentication.pdf2025-Jan-04 23:47:19341.1Kapplication/pdf
Dolan-Gavitt,Srivastava,Traynor,Giffin- Robust Signatures for Kernel Data Structures.pdf2025-Jan-04 23:47:19371.4Kapplication/pdf
Douceur- The Sybil Attack.pdf2025-Jan-04 23:47:1997.7Kapplication/pdf
Doupe,Cavedon,Kruegel,Vigna- A State-Aware Black-Box Web Vulnerability Scanner.pdf2025-Jan-04 23:47:19230.8Kapplication/pdf
Dreger,Feldmann,Paxson,Sommer- Predicting the Resource Consumption of Network Intrusion Detection Systems.pdf2025-Jan-04 23:47:192.4Mapplication/pdf
Dreyer,Harper,Chakravarty- Modular Type Classes.pdf2025-Jan-04 23:47:19298.9Kapplication/pdf
Droste,Jansen,Wegener- On the analysis of the (1+1) evolutionary algorithm.pdf2025-Jan-04 23:47:19239.7Kapplication/pdf
Duan,Lai- Improved Zero-sum Distinguisher for Full Round KECCAK-f Permutation.pdf2025-Jan-04 23:47:19211.6Kapplication/pdf
Duckwall,Campbell- Pass the Hash Part 2.pdf2025-Jan-04 23:47:19787.8Kapplication/pdf
Dudley- Cellular Privacy Regulation Space.pdf2025-Jan-04 23:47:19352.1Kapplication/pdf
Duong,Rizzo- Flickr's API Signature Forgery Vulnerability.pdf2025-Jan-04 23:47:19309.7Kapplication/pdf
Duong,Rizzo- Here Come the XOR Ninjas.pdf2025-Jan-04 23:47:19208.9Kapplication/pdf
Durocher,He,Munro,Nicholson,Skala- Range Majority in Constant Time and Linear Space.pdf2025-Jan-04 23:47:19360.0Kapplication/pdf
Dwarampudi,Dhillon,Shah,Sebastian,Kanigicharla- Comparative study of the Pros and Cons of Programming Languages Java, Scala, Cpp, Haskell, VBNET, AspectJ, Perl, Ruby, PHP, and Scheme.pdf2025-Jan-04 23:47:19803.9Kapplication/pdf
Dybvig- Three Implementation Modesl for Scheme.pdf2025-Jan-04 23:47:19492.7Kapplication/pdf
Dymetman- Group Theory and Linguistic Processing.pdf2025-Jan-04 23:47:19431.9Kapplication/pdf
Edelkamp- SYmbolic Pattern Databases in Heuristic Search Planning.pdf2025-Jan-04 23:47:19313.8Kapplication/pdf
Egele,Kreugel,Kirda,Yin,Song- Dynamic Spyware Analysis.pdf2025-Jan-04 23:47:19182.6Kapplication/pdf
Egele,Scholte,Kirda,Kruegel- A survey on automated dynamic malware-analysis techniques and tools.pdf2025-Jan-04 23:47:19451.3Kapplication/pdf
Ehrentreich- A Corrected Version of the Santa Fe Institute Artificial Stock Market Model.pdf2025-Jan-04 23:47:19286.6Kapplication/pdf
Ekblom- Can We Make Crime Prevention Adaptive by Learning from Other Evolutionary Struggles.pdf2025-Jan-04 23:47:19113.3Kapplication/pdf
Ekblom- Gearing Up Against Crime.pdf2025-Jan-04 23:47:19307.8Kapplication/pdf
Elkaduwe,Derrin,Elphinstone- Kernel Design for Isolation and Assurance of Physical Memory.pdf2025-Jan-04 23:47:19128.3Kapplication/pdf
Emura,Hanaoka,Ohtake,Matsuda,Yamada- Chosen Ciphertext Secure Keyed-Homorphic Public-Key Encryption.pdf2025-Jan-04 23:47:19322.5Kapplication/pdf
Enck,Octeau,McDaniel,Chaudhuri- A Study of Android Application Security.pdf2025-Jan-04 23:47:19461.3Kapplication/pdf
Enck,Ongtang,McDaniel- On Lightweight Mobile Phone Application Certification.pdf2025-Jan-04 23:47:19350.3Kapplication/pdf
Engebretson,Pauli,Streff- Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary.pdf2025-Jan-04 23:47:19420.8Kapplication/pdf
Engler,Kaashoek- Exterminate All Operating System Abstractions.ps2025-Jan-04 23:47:19121.5Ktext/plain
Engler- Incorporating application semantics and control into compilation.ps2025-Jan-04 23:47:19277.4Ktext/plain
Engler- The Exokernel Operating System Architecture.ps2025-Jan-04 23:47:19765.5Ktext/plain
Ensafi,Park,Kapur,Crandall- Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking.pdf2025-Jan-04 23:47:19879.9Kapplication/pdf
Epstein,Schor,Iyer,Lally,Brown,Cwiklik- Making Watson fast.pdf2025-Jan-04 23:47:193.3Mapplication/pdf
Espinhara,Albuquerque- Using Online Activity as Digital Fingerprints to Create a Better Spear Phisher.pdf2025-Jan-04 23:47:191.2Mapplication/pdf
Evans- A Heuristic Program to Solve Geometric-Analogy Problems.pdf2025-Jan-04 23:47:191.3Mapplication/pdf
Ewen,Tzoumas,Kaufmann,Markl- Spinning Fast Iterative Data Flows.pdf2025-Jan-04 23:47:19601.3Kapplication/pdf
Faber- A Quantitative Approach to Tactical Asset Allocation.pdf2025-Jan-04 23:47:191.0Mapplication/pdf
Faber- Relative Strength Strategies for Investing.pdf2025-Jan-04 23:47:19878.0Kapplication/pdf
Fallis- Floridi on Disinformation.pdf2025-Jan-04 23:47:19196.5Kapplication/pdf
Fallis- Toward an Epistemology of Wikipedia.pdf2025-Jan-04 23:47:19332.7Kapplication/pdf
Fallis- What is Lying.pdf2025-Jan-04 23:47:19184.5Kapplication/pdf
Fama,French- Common risk factors in the returns on stocks and bonds.pdf2025-Jan-04 23:47:193.3Mapplication/pdf
Fama,French- Dividend Yields and Expected Stock Returns.pdf2025-Jan-04 23:47:191.3Mapplication/pdf
Fama- Multifactor Portfolio Efficiency and Multifactor Asset Pricing.pdf2025-Jan-04 23:47:19514.1Kapplication/pdf
Fan,Kalyanpur,Gondek,Ferrucci- Automatic knowledge extraction from documents.pdf2025-Jan-04 23:47:19839.2Kapplication/pdf
Fang,Miller,Kupsch- Automated Tracing and Visualization of Software Security Structure and Properties.pdf2025-Jan-04 23:47:191.9Mapplication/pdf
Farhi,Gosset,Hassidim,Lutomirski,Shor- Quantum money from knots.pdf2025-Jan-04 23:47:19475.0Kapplication/pdf
Farooq,Llewellyn-Jones,Merabti- MAC Layer DoS Attacks in IEEE 802.11 Networks.pdf2025-Jan-04 23:47:19301.0Kapplication/pdf
Farzan,Kincaid,Podelski- Proofs That Count.pdf2025-Jan-04 23:47:19898.8Kapplication/pdf
Fatahalian,Houston- A Closer Look at GPUs.pdf2025-Jan-04 23:47:191.7Mapplication/pdf
Felner,Meshulam,Holte,Korf- Compressing Pattern Databases.pdf2025-Jan-04 23:47:1970.6Kapplication/pdf
Fiat,Tassa- Dynamic Traitor Tracing.pdf2025-Jan-04 23:47:19224.3Kapplication/pdf
Fielding- Architectural Styles and the Design of Network-based Software Architectures.pdf2025-Jan-04 23:47:191.2Mapplication/pdf
Fifield,Hardison,Ellithorpe,Stark,Boneh,Dingledine,Porras- Evading Censorship with Browser-Based Proxies.pdf2025-Jan-04 23:47:19773.4Kapplication/pdf
Filimonov,Wheatley,Sornette- Effective Measure of Endogeneity for the Autoregressive Conditional Duration Point Processes via Mapping to the Self-Excited Hawkes Process.pdf2025-Jan-04 23:47:19381.5Kapplication/pdf
Finifter,Akhawe,Wagner- An Empirical Study of Vulnerability Rewards Programs.pdf2025-Jan-04 23:47:192.0Mapplication/pdf
Flood- An Introduction to Complete Markets.pdf2025-Jan-04 23:47:198.9Mapplication/pdf
Fogel,Hays,Hahn,Quon- A Self-Learning Evolutionary Chess Program.pdf2025-Jan-04 23:47:19651.6Kapplication/pdf
Follmer,Schied- Convex and coherent risk measures.pdf2025-Jan-04 23:47:19146.7Kapplication/pdf
Follmer,Schied- Convex measures of risk and trading constraints.pdf2025-Jan-04 23:47:19156.6Kapplication/pdf
Forsyth- A Hamilton Jacobi Bellman Approach to Optimal Trade Execution.pdf2025-Jan-04 23:47:19579.7Kapplication/pdf
Fredman,Saks- The cell probe complexity of dynamic data structures.pdf2025-Jan-04 23:47:201.1Mapplication/pdf
Fredman,Willard- Surpassing the Information Theoretic Bound with Fusion Trees.pdf2025-Jan-04 23:47:20910.1Kapplication/pdf
Frier,Tang,King- Secure Web Browsing with the OP Web Browser.pdf2025-Jan-04 23:47:20332.1Kapplication/pdf
Frubb,Bagnell- Stacked Training for Overfitting Avoidance in Deep Networks.pdf2025-Jan-04 23:47:20715.1Kapplication/pdf
Fujii,Takahashi- Making Mean-Variance Hedging Implementable in a Partially Observable Market.pdf2025-Jan-04 23:47:20360.2Kapplication/pdf
Fujisaki,Okamoto- Secure Integration of Asymmetric and Symmetric Encryption Schemes.pdf2025-Jan-04 23:47:20375.8Kapplication/pdf
Gafni,Staddon,Yin- Efficient Methods for Integrating Traceability and Broadcast Encryption.pdf2025-Jan-04 23:47:20227.4Kapplication/pdf
Gallager,Humblet,Spira- A Distributed Algorithm for MSTs.pdf2025-Jan-04 23:47:20745.0Kapplication/pdf
Gallant,Lambert,Vanstone- Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms.pdf2025-Jan-04 23:47:20134.8Kapplication/pdf
Galway- Analytic Computation of the Prime-Counting Function.pdf2025-Jan-04 23:47:202.6Mapplication/pdf
Gambino (prepared by Kapulkin and Lumsdaine)- Univalence and Function Extensionality.pdf2025-Jan-04 23:47:20215.6Kapplication/pdf
Ganjali,Lie- Auditing Cloud Administrators Using Information Flow Tracking.pdf2025-Jan-04 23:47:20228.4Kapplication/pdf
Garay,Jakobsson,MacKenzie- Abuse-Free Optimistic Contract Signing.pdf2025-Jan-04 23:47:20236.8Kapplication/pdf
Garcia-Alfaro,Navarro-Arribas- A Survey on Detection Techniques to Prevent XSS Attacks on Current Web Applications.pdf2025-Jan-04 23:47:20119.5Kapplication/pdf
Garcia-Perez,Nogueira,Sergey- Deriving Interpretations of the Gradually-Typed Lambda Calculus.pdf2025-Jan-04 23:47:20424.1Kapplication/pdf
Garfield,Peterson,Perry- Social Cognition, Language Acquisition and the Development of the Theory of Mind.pdf2025-Jan-04 23:47:20271.0Kapplication/pdf
Garfinkel- Paradigms for Virtualization Based Host Security.pdf2025-Jan-04 23:47:20516.6Kapplication/pdf
Garg,Gentry,Halevi,Raykova,Sahai,Waters- Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits.pdf2025-Jan-04 23:47:20632.5Kapplication/pdf
Garner,van den Berg- Topological and simplicial models of identity types.pdf2025-Jan-04 23:47:20437.5Kapplication/pdf
Garner- A homotopy-theoretic universal property of Leinster's operad for weak omega-categories.pdf2025-Jan-04 23:47:20142.8Kapplication/pdf
Garner- Homomorphisms of higher categories.pdf2025-Jan-04 23:47:20367.2Kapplication/pdf
Garner- Ionads.pdf2025-Jan-04 23:47:20266.0Kapplication/pdf
Garner- Polycategories.pdf2025-Jan-04 23:47:201.1Mapplication/pdf
Garner- Two-dimensional models of type theory.pdf2025-Jan-04 23:47:20424.7Kapplication/pdf
Geffner- End-toEnd Analysis of a Domain Generating Algorithm Malware Family.pdf2025-Jan-04 23:47:202.6Mapplication/pdf
Geffner- TOR all the things.pdf2025-Jan-04 23:47:20838.8Kapplication/pdf
Gelly,Silver- Achieving master level play in 9x9 computer go.pdf2025-Jan-04 23:47:20244.8Kapplication/pdf
Genkin,Shamir,Tromer- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.pdf2025-Jan-04 23:47:207.7Mapplication/pdf
Gentry- Fully Homomorphic Encryption using Ideal Lattices.pdf2025-Jan-04 23:47:20597.9Kapplication/pdf
Georgeot,Giraud- The game of go as a complex network.pdf2025-Jan-04 23:47:20786.4Kapplication/pdf
Georgiadis- Binomial Options Pricing Has No Closed-Form Solution.pdf2025-Jan-04 23:47:20291.6Kapplication/pdf
Gervais,Heaton,Odean- Overconfidence, Compensation Contracts and Capital Budgeting.pdf2025-Jan-04 23:47:20324.7Kapplication/pdf
Gervais,Odean- Learning to be Overconfident.pdf2025-Jan-04 23:47:20286.7Kapplication/pdf
Gilad,Herzberg- Off-Path Attacking the Web.pdf2025-Jan-04 23:47:20687.7Kapplication/pdf
Gilbert,Lynch- Brewer's Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services.pdf2025-Jan-04 23:47:20715.5Kapplication/pdf
Gilboa,Ishai- Compressing Cryptographic Resources.pdf2025-Jan-04 23:47:20242.4Kapplication/pdf
Gilboa- Two Party RSA Key Generation.pdf2025-Jan-04 23:47:20205.7Kapplication/pdf
Gill,Ganjali,Wong,Lie- Circumventing measurement-based IP geolocation.pdf2025-Jan-04 23:47:20440.8Kapplication/pdf
Gionis,Indyk,Motwani- Similarity Search in High Dimensions via Hashing.ps2025-Jan-04 23:47:20320.9Ktext/plain
Gjomemo,Malik,Sumb,Venkatakrishnan,Ansari- Digital Check Forgery Attacks on Client Check Truncation Systems.pdf2025-Jan-04 23:47:201.2Mapplication/pdf
Godefroid,Levin,Molnar- Automated Whitebox Fuzz Testing.pdf2025-Jan-04 23:47:20637.1Kapplication/pdf
Golan,Gerig- A Stochastic Feedback Model for Volatility.pdf2025-Jan-04 23:47:20672.6Kapplication/pdf
Goldberg- A Pseudonymous Communications Infrastructure for the Internet.pdf2025-Jan-04 23:47:20381.5Kapplication/pdf
Goldreich,Sahai,Vadhan- Can Statistical Zero Knowledge be Made Non-interactive or On the Relationship of SZK and NISZK.pdf2025-Jan-04 23:47:20259.7Kapplication/pdf
Goldstein,Rosewater- What Makes a Good Molecular-Scale Computer Device.pdf2025-Jan-04 23:47:20183.2Kapplication/pdf
Goldwasser,Kalai,Popa,Vaikuntanathan,Zeldovich- How to Run Turing Machines on Encrypted Data.pdf2025-Jan-04 23:47:20329.0Kapplication/pdf
Goldwasser,Kalai,Popa,Vaikuntanathan,Zeldovich- Overcoming the Worst-Case Curse for Cryptographic Constructions.pdf2025-Jan-04 23:47:20450.9Kapplication/pdf
Goldwasser,Kalai,Popa,Vaikuntanathan,Zeldovich- Reusable Garbled Circuits and Succinct Functional Encryption.pdf2025-Jan-04 23:47:20302.6Kapplication/pdf
Goldwasser,Micali- Probabilistic Encryption.pdf2025-Jan-04 23:47:201.7Mapplication/pdf
Goll,Kallsen- Optimal portfolios for logarithmic utility.pdf2025-Jan-04 23:47:20172.6Kapplication/pdf
Goll,Ruschendorf- Minimax and Minimal Distance Martingale Measures and Their Relationship to Portfolio Optimization.pdf2025-Jan-04 23:47:20300.8Kapplication/pdf
Gondek,Lally,Kalyanpur,Murdock,Duboue,Zhang,Pan,Qiu,Welty- A frameowkr for merging and ranking of answers in DeepQA.pdf2025-Jan-04 23:47:201.5Mapplication/pdf
Gonzalez,Grabowski,Makinen,Navarro- Practical Implementation of Rank and Select Queries.pdf2025-Jan-04 23:47:20150.2Kapplication/pdf
Goodfellow,Bulatov,Ibarz,Arnoud,Shet- Multi-digit Number Recognition from Street View Imagery using Deep Convolutional Neural Networks.pdf2025-Jan-04 23:47:204.7Mapplication/pdf
Goodman- The Principles and Practice of Probabilistic Programming.pdf2025-Jan-04 23:47:20101.1Kapplication/pdf
Goold,Loader,Thumala- The Banality of Security.pdf2025-Jan-04 23:47:20866.9Kapplication/pdf
Gorenc,Spellman- Java Every Days Exploiting Software Running on 3 Billion Devices.pdf2025-Jan-04 23:47:203.0Mapplication/pdf
Gourieroux,Laurent,Scaillet- Sensitivity analysis of VaR.pdf2025-Jan-04 23:47:20331.9Kapplication/pdf
Grier,Thomas,Nicol- Barriers to Security and Privacy Research in the Web Era.pdf2025-Jan-04 23:47:20107.3Kapplication/pdf
Griffin,Schneider,Hu,Chiueh- Automatic generation of string signatures for malware detection.pdf2025-Jan-04 23:47:20317.6Kapplication/pdf
Grosse,Madison,Salakhutdinov- Annealing Between Distributions by Averaging Moments.pdf2025-Jan-04 23:47:20820.2Kapplication/pdf
Guasoni,Muhle-Karbe,Xing- Robust Portfolios and Weak Incentives in Long-Run Investments.pdf2025-Jan-04 23:47:20570.8Kapplication/pdf
Guerard- Is There a Cost to Being Socially Responsible in Investing.pdf2025-Jan-04 23:47:20678.4Kapplication/pdf
Guha,Saftoiu,Krishnamurthi- The Essence of JavaScript.pdf2025-Jan-04 23:47:20358.9Kapplication/pdf
Gupta- LTE Booms with Vulnerabilities.pdf2025-Jan-04 23:47:20156.1Kapplication/pdf
Hajishirzi,Mueller- Question Answering in Natural Language Narratives Using Symbolic Probabilistic Reasoning.pdf2025-Jan-04 23:47:201.0Mapplication/pdf
Hajishirzi,Mueller- Symbolic Probabilistic Reasoning for Narratives.pdf2025-Jan-04 23:47:20668.1Kapplication/pdf
Halderman,Schoen,Heninger,Clarkson,Paul,Calandrino,Feldman,Appelbaum,Felten- Cold Boot Attacks on Encryption Keys.pdf2025-Jan-04 23:47:202.7Mapplication/pdf
Halevy,Norvig,Pereira- The Unreasonable Effectiveness of Data.pdf2025-Jan-04 23:47:20376.8Kapplication/pdf
Hallem,Chelf,Xie,Engler- A System and Language for Building System-Specific, Static Analyses.pdf2025-Jan-04 23:47:20208.9Kapplication/pdf
Hamblin,Hurd- Genetic Algorithms and non-ESS solutions to game theory models.pdf2025-Jan-04 23:47:20585.6Kapplication/pdf
Hammerli,Sommer- Detection of Intrusions and Malware, and Vulnerability Assessment.pdf2025-Jan-04 23:47:206.8Mapplication/pdf
Hammoudeh,Santos,Al-Hassan- Downside risk management and VaR-based optimal portfolios for precious metals, oil, and stocks.pdf2025-Jan-04 23:47:20669.7Kapplication/pdf
Han- Deterministic Sorting in O(n log log n) Time and Linear Space.pdf2025-Jan-04 23:47:20159.4Kapplication/pdf
Hanna- Attacks on Emerging Architectures.pdf2025-Jan-04 23:47:202.7Mapplication/pdf
Hanspach,Goetz- On Covert Acoustical Mesh Networks in Air.pdf2025-Jan-04 23:47:203.2Mapplication/pdf
Hanzlik,Kluczniak,Kutylowski- Attack on U-Prove Revocation Scheme from FC'13- Exploiting the Weakness of the Underlying Accumulator Scheme.pdf2025-Jan-04 23:47:20192.6Kapplication/pdf
Hanzlik,Kluczniak- A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates.pdf2025-Jan-04 23:47:20199.6Kapplication/pdf
Hanzlik,Kluczniak- Attack against a Pairing Based Anonymous Authentication Protocol.pdf2025-Jan-04 23:47:20206.5Kapplication/pdf
Harish,Narayanan- Accelerating Large Graph Algorithms on the GPU Using CUDA.pdf2025-Jan-04 23:47:20371.7Kapplication/pdf
Harrison,Pliska- Martingales and Stochastic Integrals in the theory of Continuous Trading.pdf2025-Jan-04 23:47:20888.0Kapplication/pdf
Hass- Algorithms for recognizing knots and 3-manifolds.pdf2025-Jan-04 23:47:20232.1Kapplication/pdf
Hauser,Krishnamurthy,Tutuncu- Relative Robust Portfolio Optimization.pdf2025-Jan-04 23:47:20304.3Kapplication/pdf
Havran- Heuristic Ray Shooting Algorithms.pdf2025-Jan-04 23:47:217.3Mapplication/pdf
Hay- Android Collapses into Fragments.pdf2025-Jan-04 23:47:21323.4Kapplication/pdf
Hayatle,Youssef,Otrok- Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies.pdf2025-Jan-04 23:47:21182.2Kapplication/pdf
He,You,Tang- Writer identification of Chinese handwriting documents using hidden Markov tree model.pdf2025-Jan-04 23:47:212.6Mapplication/pdf
Hedberg- A coherence theorem for Martin-Lof's type theory.pdf2025-Jan-04 23:47:21341.1Kapplication/pdf
Heffner- Exploiting Surveillance Cameras Like a Hollywood Hacker.pdf2025-Jan-04 23:47:213.9Mapplication/pdf
Heggernes,van't Hof,van Leeuwen,Sael- Finding Disjoint Paths in Split Graphs.pdf2025-Jan-04 23:47:21260.3Kapplication/pdf
Hendershott,Jones,Menkveld- Does Algorithmic Trading Improve Liquidity.pdf2025-Jan-04 23:47:21783.1Kapplication/pdf
Hendler,Carbonell,Lenat,Mizoguchi,Rosenbloom- VERY Large Knowledge bases- Architecture vs Engineering.pdf2025-Jan-04 23:47:2183.0Kapplication/pdf
Henne,Koch,Smith- On the Awareness, Control and Privacy of Shared Photo Metadata.pdf2025-Jan-04 23:47:211.9Mapplication/pdf
Henshall,Rampersad,Shallit- Shuffling and Unshuffling.pdf2025-Jan-04 23:47:2176.6Kapplication/pdf
Herder,Bos,Tanenbaum- A Lightweight Method for Building Reliable OS Despite Unreliable Device Drivers.pdf2025-Jan-04 23:47:21145.3Kapplication/pdf
Herley- The Rational Rejection of Security Advice by Users.pdf2025-Jan-04 23:47:21180.6Kapplication/pdf
Herley- Why do Nigerian Scammers Say They are from Nigeria.pdf2025-Jan-04 23:47:21539.9Kapplication/pdf
Hernadvolgyi,Holte- Steps Towards the Automatics Creation of Search Heuristics.pdf2025-Jan-04 23:47:21428.7Kapplication/pdf
Herve,Hayes,Hare- Psychopathy and sensitivity to the emotional polarity of metaphorical statements.pdf2025-Jan-04 23:47:21225.4Kapplication/pdf
Herzberg,Porat,Soffer,Waisbard- Camouflaged Private Communication.pdf2025-Jan-04 23:47:21183.8Kapplication/pdf
Hifny- Acoustic Modeling Based on Deep Conditional Random Fields.pdf2025-Jan-04 23:47:21349.7Kapplication/pdf
Hinton,Deng,Yu,Dahl,Mohamed,Jaitly,Senior,Vanhoucke,Nguyen,Sainath,Kingsbury- Deep Neural Networks for Acoustic Modeling in Speech Recognition.pdf2025-Jan-04 23:47:21635.2Kapplication/pdf
Hinton,Srivastava,Krizhevsky,Sutskever,Salakhutdinov- Improving neural networks by preventing co-adaptation of feature detectors.pdf2025-Jan-04 23:47:211.6Mapplication/pdf
Hofstra,Warren- Combinatorial realizability models of type theory.pdf2025-Jan-04 23:47:21352.5Kapplication/pdf
Hohenberger,Waters- Attribute-Based Encryption with Fast Decryption.pdf2025-Jan-04 23:47:2124.0Kapplication/pdf
Holler,Herzig,Zeller- Fuzzing with Code Fragments.pdf2025-Jan-04 23:47:21556.9Kapplication/pdf
Holub,Fridrich,Denemark- Universal distortion function for steganography in an arbitrary domain.pdf2025-Jan-04 23:47:211.3Mapplication/pdf
Hoorn,Frank,Kowalczyk,van der Ham- Neural Network Identification of Poets Using Letter Sequences.pdf2025-Jan-04 23:47:211.4Mapplication/pdf
Hopper- Challenges in protecting Tor hidden services from botnet abuse.pdf2025-Jan-04 23:47:21424.6Kapplication/pdf
Hornyack,Han,Jung,Schechter,Wetherall- Retrofitting Android to Protect Data from Imperious Applications.pdf2025-Jan-04 23:47:21630.8Kapplication/pdf
Hou,Harper- Type Refinements for Compiler Correctness.pdf2025-Jan-04 23:47:21292.6Kapplication/pdf
Hovemeyer,Pugh- Finding Bugs is Easy.pdf2025-Jan-04 23:47:21102.4Kapplication/pdf
Hsu- Cap-Weighted Portfolios are Sub-Optimal Portfolios.pdf2025-Jan-04 23:47:2185.7Kapplication/pdf
Huckaby,Christensen- Toward A Knowledge Transfer Framework for Process Abstraction in Manufacturing Robotics.pdf2025-Jan-04 23:47:212.7Mapplication/pdf
Hudak,Hughes,Wadler,Peyton-Jones- A History of Haskell.pdf2025-Jan-04 23:47:21984.4Kapplication/pdf
Hundt- Loop Recognition in Cpp,Java,Go,Scala.pdf2025-Jan-04 23:47:21310.9Kapplication/pdf
Hurlbut- Fuzzy Hashing for Digital Forensic Investigators.pdf2025-Jan-04 23:47:21808.1Kapplication/pdf
Hyung,de Vries- Portfolio selection with heavy tails.pdf2025-Jan-04 23:47:21352.4Kapplication/pdf
Hyung,de Vries- Simulating and calibrating diversification against black swans.pdf2025-Jan-04 23:47:21294.0Kapplication/pdf
IBM- The IBM Blue Gene project.pdf2025-Jan-04 23:47:212.1Mapplication/pdf
Indyk,Kapralov,Price- (Nearly) Sample-Optimal Sparse Fourier Transform.pdf2025-Jan-04 23:47:21440.9Kapplication/pdf
Ingemarsson,Simmons- A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutually Trusted Party.pdf2025-Jan-04 23:47:21691.1Kapplication/pdf
Irani,Weippl- Automation of Post-exploitation.pdf2025-Jan-04 23:47:21123.8Kapplication/pdf
Ishai,Weiss- Probabilistically Checkable Proofs of Proximity with Zero-Knowledge.pdf2025-Jan-04 23:47:21387.5Kapplication/pdf
Jackson,Barth,Bortz,Shao,Boneh- Protecting Browsers from DNS Rebinding Attacks.pdf2025-Jan-04 23:47:211.2Mapplication/pdf
Jacobson,Rosenblum,Miller- Labeling Library Functions in Stripped Binaries.pdf2025-Jan-04 23:47:21270.9Kapplication/pdf
Jakobsson,Dhiman- The Benefits of Understanding Passwords.pdf2025-Jan-04 23:47:21519.7Kapplication/pdf
Jakobsson,Yung- Revokable and Versatile Electronic Money.pdf2025-Jan-04 23:47:211.4Mapplication/pdf
Jang,Woo,Brumley- Towards Automatic Software Lineage Inference.pdf2025-Jan-04 23:47:212.1Mapplication/pdf
Jansen,Bauer,Hopper,Dingledine- Methodically Modeling the Tor Network.pdf2025-Jan-04 23:47:21593.8Kapplication/pdf
Jansen,Pradel- A New Asymptotic Approximation Algorithm for 3-Dimensional Strip Packing.pdf2025-Jan-04 23:47:21298.8Kapplication/pdf
Jansen,Syverson,Hopper- Throttling Tor Bandwidth Parasites.pdf2025-Jan-04 23:47:211.1Mapplication/pdf
Jarrow,Rosenfeld- Jump Risks and the ICAPM.pdf2025-Jan-04 23:47:211.0Mapplication/pdf
Jeanblanc,Mania,Santacroce,Schweizer- Mean-Variance Hedging via Stochastic Control and BSDEs for General Semimartingales.pdf2025-Jan-04 23:47:21487.3Kapplication/pdf
Jerger- Chip Multiprocessor Coherence and Interconnect System Design.pdf2025-Jan-04 23:47:214.9Mapplication/pdf
Jha,Sommer,Kreibich- Recent Advances in Intrusion Detection.pdf2025-Jan-04 23:47:2110.3Mapplication/pdf
Johann,Voigtlander- Free Theorems in the Presence of seq.pdf2025-Jan-04 23:47:21243.4Kapplication/pdf
Johansson,Jonsson- Fast Correlation Attacks Based on Turbo Code Techniques.pdf2025-Jan-04 23:47:21265.0Kapplication/pdf
Johns,Lekies,Stock- Eradicating DNS Rebinding with the Extended Same-origin Policy.pdf2025-Jan-04 23:47:211.9Mapplication/pdf
Johnson,Laszka,Grossklags- The Complexity of Estimating Systematic Risk in Networks.pdf2025-Jan-04 23:47:21426.7Kapplication/pdf
Johnson,Zhao,Hunsader,Meng,Ravindar,Carran,Tivnan- Financial black swans driven by ultrafast machine ecology.pdf2025-Jan-04 23:47:211.9Mapplication/pdf
Johnson- Implementing Active Defense Systems on Private Networks.pdf2025-Jan-04 23:47:21929.4Kapplication/pdf
Johnsson- Efficient Compilation of Lazy Evaluation.pdf2025-Jan-04 23:47:21281.3Kapplication/pdf
Jones,Wadler- Imperative Functional Programming.ps2025-Jan-04 23:47:21183.0Ktext/plain
Jonoska,Manea,Seki- A Stronger Conjecture on Binary Words.pdf2025-Jan-04 23:47:21253.5Kapplication/pdf
Jordan,Royes,Whyte- Writing Detection Signatures.pdf2025-Jan-04 23:47:21145.5Kapplication/pdf
Jung- Real-Time Detection of Malicious Network Activity Using Stochastic Models.pdf2025-Jan-04 23:47:213.9Mapplication/pdf
Kaklamanis,Papatheodorou,Spirakis- Euro-Par 2012 Parallel Processing.pdf2025-Jan-04 23:47:2227.5Mapplication/pdf
Kalyanpur,Patwardhan,Boguraev,Lally,Chu-Carroll- Fact-based question decomposition in DeepQA.pdf2025-Jan-04 23:47:22503.3Kapplication/pdf
Kambourakis,Moschos,Geneiatakis,Gritzalis- A Fair Solution to DNS Amplification Attacks.pdf2025-Jan-04 23:47:22339.3Kapplication/pdf
Kambourakis,Moschos,Geneiatakis,Gritzalis- Detecting DNS Amplification Attacks.pdf2025-Jan-04 23:47:22298.5Kapplication/pdf
Kang,Lee,Gligor- The Crossfire Attack.pdf2025-Jan-04 23:47:22827.0Kapplication/pdf
Kang,Yin,Hanna,McCamant,Song- Emulating Emulation-Resistant Malware.pdf2025-Jan-04 23:47:22205.0Kapplication/pdf
Kapralov,Panigrahy- Prediction strategies without loss.pdf2025-Jan-04 23:47:22279.3Kapplication/pdf
Kapulkin,Lumsdaine,Voevodsky- The Simplicial Model of Univalent Foundations.pdf2025-Jan-04 23:47:22480.6Kapplication/pdf
Kapulkin,Lumsdaine,Voevodsky- Univalence in Simplicial Sets.pdf2025-Jan-04 23:47:22172.8Kapplication/pdf
Karanth,Tripathi- Monitoring of Wireless Networks for Intrusions and Attacks.pdf2025-Jan-04 23:47:22131.0Kapplication/pdf
Karatzas- On the Pricing of American Options.pdf2025-Jan-04 23:47:221.1Mapplication/pdf
Karimi,Dickson,Hamze- High-Performance Physics Simulations Using Multi-Core CPUs and GPGPUs in a Volunteer Computing Context.pdf2025-Jan-04 23:47:2292.8Kapplication/pdf
Katz,Thiruvengadam,Zhou- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.pdf2025-Jan-04 23:47:22296.4Kapplication/pdf
Kelley,Komanduri,Mazurek,Shay,Bauer,Christin,Cranor,Lopez- Measuring Password Strength by Simulating Password-Cracking Algorithms.pdf2025-Jan-04 23:47:222.6Mapplication/pdf
Kelly- A New Interpretation of Information Rate.pdf2025-Jan-04 23:47:224.2Mapplication/pdf
Kelsey,Schneier- Second Preimages on n-bit Hash Functions for Much Less than 2^n Work.pdf2025-Jan-04 23:47:22165.0Kapplication/pdf
Kennedy,Forsyth,Vetzal- Dynamic Hedging under Jump Diffusion with Transaction Costs.pdf2025-Jan-04 23:47:22432.6Kapplication/pdf
Kennedy,Muttik- IEEE Clean File Metadata Exchange.pdf2025-Jan-04 23:47:22633.7Kapplication/pdf
Kerinin,Merkoulovitch,Rosen,Zerbs- Measuring Portfolio Risk Using Quasi Monte Carlo Methods.pdf2025-Jan-04 23:47:22272.1Kapplication/pdf
Kermer,Driver-Linn,Wilson,Gilbert- Loss aversion is an affective forecasting error.pdf2025-Jan-04 23:47:22188.9Kapplication/pdf
Khindanova,Rachev,Schwartz- Stable Modeling of VaR.pdf2025-Jan-04 23:47:222.2Mapplication/pdf
Khoo- Decompilation as search.pdf2025-Jan-04 23:47:221.4Mapplication/pdf
Kim,Chandra,Zeldovich- Efficient patch-based auditing for web application vulnerabilities.pdf2025-Jan-04 23:47:22220.3Kapplication/pdf
Kim,Chandra,Zeldovich- Recovering from Intrusions in Distributed Systems with Dare.pdf2025-Jan-04 23:47:22108.1Kapplication/pdf
Kim,Peinado,Mainar-Ruiz- System-Level Protection Against Cache-based Side Channel Attacks in the Cloud.pdf2025-Jan-04 23:47:22505.8Kapplication/pdf
Kim,Wang,Zeldovich,Kaashoek- Intrusion Recovery Using Selective Re-execution.pdf2025-Jan-04 23:47:22518.1Kapplication/pdf
Kim,Zeldovich- Making Linux Protection Mechanisms Egalitarian with UserFS.pdf2025-Jan-04 23:47:22278.3Kapplication/pdf
Kim,Zeldovich- Practical and Effective Sandboxing for Non-root Users.pdf2025-Jan-04 23:47:22133.8Kapplication/pdf
King,Tucek,Cozzie,Grier,Jiang,Zhou- Designing and Implementing malicious hardware.pdf2025-Jan-04 23:47:22110.3Kapplication/pdf
Kipnis,Shamir- Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization.pdf2025-Jan-04 23:47:22175.4Kapplication/pdf
Kirlappos,Sasse- Security Education against Phishing.pdf2025-Jan-04 23:47:221.8Mapplication/pdf
Kittilsen- Detecting malicious PDF documents.pdf2025-Jan-04 23:47:222.1Mapplication/pdf
Kleinjung,Bos,Lenstra,Osvik,Aoki,Continu,Franke,Thome,Jermini,Thiemard,Leyland,Montgomery,Timofeev,Stockinger- A heterogeneous computing environment to solve the 768-bit RSA challenge.pdf2025-Jan-04 23:47:22448.9Kapplication/pdf
Knudsen,Robshaw,Wagner- Truncated Differentials and Skipjack.pdf2025-Jan-04 23:47:22197.9Kapplication/pdf
Kocher,Jaffe,Jun- Differential Power Analysis.pdf2025-Jan-04 23:47:22398.5Kapplication/pdf
Kocher- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.pdf2025-Jan-04 23:47:22206.7Kapplication/pdf
Kolkiewicz- Volatility Risk for Regime Switching Models.pdf2025-Jan-04 23:47:22265.9Kapplication/pdf
Korf,Zhang- Divide-and-Conquer frontier search applied to optimal sequence alignment.pdf2025-Jan-04 23:47:22160.4Kapplication/pdf
Kornblum- Identifying almost identical files using context triggered piecewise hashing.pdf2025-Jan-04 23:47:22256.0Kapplication/pdf
Koshy,Koshy,McDaniel- An Analysis of Anonymity in Bitcoin Using P2P Network Traffic.pdf2025-Jan-04 23:47:22472.5Kapplication/pdf
Krishnamurthi- From Principles to Programming Languages (and Back).pdf2025-Jan-04 23:47:2213.9Kapplication/pdf
Krizhevsky,Sutskever,Hinton- ImageNet Classification with Deep Convolutional Neural Networks.pdf2025-Jan-04 23:47:221.3Mapplication/pdf
Kroha,Friedrich- Comparison on Genetic Algorithms for Trading Strategies.pdf2025-Jan-04 23:47:22530.8Kapplication/pdf
Kruegel,Robertson,Valeur,Vigna- Static Disassembly of Obfuscated Binaries.pdf2025-Jan-04 23:47:22310.4Kapplication/pdf
Krzywiecki,Kublak,Kutylowski- Probabilistic Admissible Encoding on Elliptic Curves- Toward PACE with Generalized Integrated Mapping.pdf2025-Jan-04 23:47:22305.9Kapplication/pdf
Kschischang,Frey,Loeliger- Factor Graphcs and the Sum-Product Algorithm.pdf2025-Jan-04 23:47:22458.8Kapplication/pdf
Ksystra,Stefaneas,Frangos- An Algebraic Framework for Modeling of Reactive Rule-Based Intelligent Agents.pdf2025-Jan-04 23:47:22393.7Kapplication/pdf
Ku,Hart,Chechik,Lie- A Buffer Overflow Benchmark for Software Model Checkers.pdf2025-Jan-04 23:47:22109.0Kapplication/pdf
Kukielka,Kotulski- Analysis of neural netowrks usage for detection of a new attack in IDS.pdf2025-Jan-04 23:47:22135.6Kapplication/pdf
Kumar,Kanal- A General Branch and Bound Formulation for Understanding and Synthesizing And-Or Tree Search Procedures.pdf2025-Jan-04 23:47:22864.6Kapplication/pdf
Kumar,Rajagopalan,Sahai- Coding Constructions for Blacklisting Problems without Computational Assumptions.pdf2025-Jan-04 23:47:22290.0Kapplication/pdf
Kuo,Romanosky,Cranor- Human Selection of Mnemonic Phrase-based Passwords.pdf2025-Jan-04 23:47:22471.9Kapplication/pdf
Kupsch,Miller- How to Open a File and Not Get Hacked.pdf2025-Jan-04 23:47:22130.6Kapplication/pdf
Kutrib,Meckel,Wendlandt- Parameterized Prefix Distance between Regular Languages.pdf2025-Jan-04 23:47:22227.2Kapplication/pdf
Lagos,Wright- A Unified Framework for Monetary Theory and Policy Analysis.pdf2025-Jan-04 23:47:22604.9Kapplication/pdf
Lakshman,Malik- Cassandra- A Decentralized Structured Storage System.pdf2025-Jan-04 23:47:22291.4Kapplication/pdf
Lal- Comparative Analysis of VaR Methods for Portfolio with Non-Linear Return.pdf2025-Jan-04 23:47:22493.2Kapplication/pdf
Lamport- Solved Problems, Unsolved Problems and Non-Problems in Concurrency.pdf2025-Jan-04 23:47:221.0Mapplication/pdf
Larson,Nilsson,Jonsson- A General Model and Guidelines for Attack Manifestation Generation.pdf2025-Jan-04 23:47:22221.8Kapplication/pdf
Laskov,Srndic- Static Detection of Malicious JavaScript-Bearing PDF Documents.pdf2025-Jan-04 23:47:22198.3Kapplication/pdf
Laszka,Johnson,Grosskalgs,Felegyhazi- Estimating Systematic Risk in Real-World Networks.pdf2025-Jan-04 23:47:22292.2Kapplication/pdf
Laube,Nebel- Maximum likelihood analysis of algorithms and data structures.pdf2025-Jan-04 23:47:239.1Mapplication/pdf
Lavrenko,Croft- Relevance-Based Language Models.pdf2025-Jan-04 23:47:23112.5Kapplication/pdf
LeBaron- Building the Santa Fe Artificial Stock Market.pdf2025-Jan-04 23:47:23122.9Kapplication/pdf
Leather,Jeuring,Loh,Schuur- Type-Changing Rewriting and Semantics-Preserving Transformation.pdf2025-Jan-04 23:47:23329.7Kapplication/pdf
Lee,Chan- Smashing the Font Scaler Engine in WIndows Kernel.pdf2025-Jan-04 23:47:231.1Mapplication/pdf
Lee,Choi,Wolinsky,Boykin,Figueiredo- Parallel Processing Framework on a P2P System Using Map and Reduce Primitives.pdf2025-Jan-04 23:47:23544.3Kapplication/pdf
Lee,Crary,Harper- Towards a Mechanized Metatheory of Standard ML.pdf2025-Jan-04 23:47:23232.8Kapplication/pdf
Lee,Ro,Gaudiot- Boosting CUDA Applications with CPU-GPU Hybrid Computing.pdf2025-Jan-04 23:47:231.2Mapplication/pdf
Lee,Yosinski,Glette,Lipson,Clune- Evolving gaits for physical robots with the HyperNEAT generative encoding.pdf2025-Jan-04 23:47:23566.4Kapplication/pdf
Leroy- Formal Certification of a Compiler Back-end.pdf2025-Jan-04 23:47:23182.8Kapplication/pdf
Lettau,Ldvigson- Expected returns and expected dividend growth.pdf2025-Jan-04 23:47:23317.9Kapplication/pdf
Levis- Experiences from a Decade of TinyOS Development.pdf2025-Jan-04 23:47:23239.9Kapplication/pdf
Lewenstein,Munro,Raman- Succinct data structures for representing equivalence classes.pdf2025-Jan-04 23:47:23170.4Kapplication/pdf
Li,Albarghouthi,Kincaid,Gurfinkel,Chechik- Symbolic Optimization with SMT Solvers.pdf2025-Jan-04 23:47:23482.0Kapplication/pdf
Li,Chen,Li,Ma,Vitanyi- The Similarity Metric.pdf2025-Jan-04 23:47:23179.9Kapplication/pdf
Li,Marlow,Peyton Jones,Tolmach- Lightweight Concurrency Primitives for GHC.pdf2025-Jan-04 23:47:23277.6Kapplication/pdf
Li,Ng,Tan,Yang- Optimal Constant-Rebalanced Portfolio Investment Strategies for Dynamic Portfolio Selection.pdf2025-Jan-04 23:47:23269.5Kapplication/pdf
Li,Xu- Multi-objective portfolio selection model with fuzzy random returns and a compromise approach-based genetic algorithm.pdf2025-Jan-04 23:47:23430.4Kapplication/pdf
Lian,Rescoria,Shacham,Savage- Measuring the Practical Impact of DNSSEC Deployment.pdf2025-Jan-04 23:47:232.2Mapplication/pdf
Liang,Lai- Improved Collision Attack on Hash Function MD5.pdf2025-Jan-04 23:47:23462.9Kapplication/pdf
Licata,Harper- A Monadic Formalization of ML5.pdf2025-Jan-04 23:47:23278.9Kapplication/pdf
Licata,Harper- An Extensible Theory of Indexed Types.pdf2025-Jan-04 23:47:23248.2Kapplication/pdf
Lie,Satyanarayanan- Quantifying the Strength of Security Systems.pdf2025-Jan-04 23:47:23151.6Kapplication/pdf
Lie,Thekkath,Horowitz- Implementing an Untrusted OS on Trused Hardware.pdf2025-Jan-04 23:47:23183.0Kapplication/pdf
Lierler,Truszczynski- Abstract Modular Systems and Solvers.pdf2025-Jan-04 23:47:23283.5Kapplication/pdf
Lin, Keogh,Lonardi,Chiu- A Symbolic Representation of Time Series, with Implications for Streaming Algorithms.pdf2025-Jan-04 23:47:23579.5Kapplication/pdf
Lin,Hopper- New Attacks on Timing-based Network Flow Watermarks.pdf2025-Jan-04 23:47:231.2Mapplication/pdf
Ling,Luo,Yu,Fu,Xuan,Jia- A New Cell Counter Based Attack Against Tor.pdf2025-Jan-04 23:47:23968.8Kapplication/pdf
Ling,Luo,Yu,Fu,Xuan,Jia- A New Cell-Counting-Based Attack Against Tor.pdf2025-Jan-04 23:47:232.7Mapplication/pdf
Linn,Debray- Obfuscation of executable code to improve resistance to static disassembly.pdf2025-Jan-04 23:47:23120.7Kapplication/pdf
Litty,Lagar-Cavilla,Lie- Hypervisor Support for Identifying Covertly Executing Binaries.pdf2025-Jan-04 23:47:23550.4Kapplication/pdf
Litty,Lie- Patch Auditing in Infrastructure as a Service Clouds.pdf2025-Jan-04 23:47:23329.4Kapplication/pdf
Livshits,Jung- Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications.pdf2025-Jan-04 23:47:232.4Mapplication/pdf
Losch,Pitts- Full Abstraction for Nominal Scott Domains.pdf2025-Jan-04 23:47:23247.7Kapplication/pdf
Louth,Hare,Linden- Psychopathy and Alexithymia in Female Offenders.pdf2025-Jan-04 23:47:23848.3Kapplication/pdf
Louth,Williamson,Alpert,Pouget,Hare- Acoustic Distinctions in the Speech of Male Psychopaths.pdf2025-Jan-04 23:47:231.0Mapplication/pdf
Lowe- An attack on the Needham-Schroeder public-key authentication protocol.pdf2025-Jan-04 23:47:23245.5Kapplication/pdf
Luby,Rackoff- How to Construct Pseudorandom Permutations from Pseudorandom Functions.pdf2025-Jan-04 23:47:231.9Mapplication/pdf
Lumsdaine- Higher Categories from Type Theories.pdf2025-Jan-04 23:47:23809.2Kapplication/pdf
Lumsdaine- Weak omega-categories from Intensional Type Theory.pdf2025-Jan-04 23:47:23277.8Kapplication/pdf
Mahoney- A Machine Learning Approach to Detecting Attacks by Identifying Anomalies in Network Traffic.pdf2025-Jan-04 23:47:23773.2Kapplication/pdf
Maitra,Sarkar- Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality.pdf2025-Jan-04 23:47:23257.1Kapplication/pdf
Malheiros,Jennett,Patel,Brostoff,Sasse- A Study of the Effectiveness and Acceptability of Rich-Media Personalized Advertising.pdf2025-Jan-04 23:47:23933.5Kapplication/pdf
Mariani,Pastore,Pezze- A Toolset for Automated Failure Analysis.pdf2025-Jan-04 23:47:23878.4Kapplication/pdf
Markowitz- Efficient Diversification of Investments.pdf2025-Jan-04 23:47:237.1Mapplication/pdf
Markowitz- Portfolio Selection.pdf2025-Jan-04 23:47:231.1Mapplication/pdf
Markowitz- The Utility of Wealth.pdf2025-Jan-04 23:47:23509.7Kapplication/pdf
Marlow- Parallel and Concurrent Programming in Haskell.pdf2025-Jan-04 23:47:23981.3Kapplication/pdf
Martens,Sutskever- Training Deep and Recurrent Networks with Hessian-Free Optimization.pdf2025-Jan-04 23:47:23622.3Kapplication/pdf
Martin- Honey Pots and Honey Nets.pdf2025-Jan-04 23:47:23309.4Kapplication/pdf
Matienzo,Jerger- Performance Analysis of Broadcasting Algorithms on the Intel Single-Chip Cloud Computer.pdf2025-Jan-04 23:47:23967.2Kapplication/pdf
Maurer- Information-Theoretic Cryptography.pdf2025-Jan-04 23:47:23227.9Kapplication/pdf
Maurice,Neumann,Heen,Francillon- Confidentiality Issues on a GPU in a Virtualized Environment.pdf2025-Jan-04 23:47:23323.9Kapplication/pdf
Maxwell- The Very Unofficial Dummies Guide to Scapy.pdf2025-Jan-04 23:47:23481.7Kapplication/pdf
Mazrooei- Collusion Detection in Sequential Games.pdf2025-Jan-04 23:47:23670.6Kapplication/pdf
McCamant,Payer,Caselden,Bazhanyuk,Song- Transformation-Aware Symbolic Execution for System Test Generation.pdf2025-Jan-04 23:47:23239.8Kapplication/pdf
McCarthy- Programs with Common Sense.pdf2025-Jan-04 23:47:23148.0Kapplication/pdf
McCord,Murdock,Boguraev- Deep parsing in Watson.pdf2025-Jan-04 23:47:23631.2Kapplication/pdf
McDonell,Chakravarty,Keller,Lippmeier- Optimising Purely Functional GPU Programs.pdf2025-Jan-04 23:47:23436.1Kapplication/pdf
McLachlan,Tran,Hopper,Kim- Scalable Onion Routing with Torsk.pdf2025-Jan-04 23:47:231.0Mapplication/pdf
McNamee- How to Build a SpyPhone.pdf2025-Jan-04 23:47:23842.5Kapplication/pdf
Mehlhorn- Algorithms for Equilibrium Prices in Linear Market Models.pdf2025-Jan-04 23:47:23123.8Kapplication/pdf
Mellor-Crummey,Scott- Algorithms for Scalable Synchronization on Shared-Memory Multiprocessors.pdf2025-Jan-04 23:47:232.9Mapplication/pdf
Merelo-Guervos,Castillo,Laredo,Garcia,Prieto- Asynchronous Distributed Genetic Algorithms with Javascript and JSON.pdf2025-Jan-04 23:47:23201.9Kapplication/pdf
Merton- Option Pricing when Underlying Stock Returns are Discontinuous.pdf2025-Jan-04 23:47:231.1Mapplication/pdf
Might,Chambers,Shivers- Model Checking via Gamma-CFA.pdf2025-Jan-04 23:47:23406.9Kapplication/pdf
Might,Shivers- Environment Analysis via delta-CFA.pdf2025-Jan-04 23:47:23340.3Kapplication/pdf
Might,Shivers- Improving Flow Analyses via Gamma-CFA.pdf2025-Jan-04 23:47:23251.6Kapplication/pdf
Mihalcea,Liu,Lieberman- Natural Language Processing for Natural Language Programming.pdf2025-Jan-04 23:47:23227.8Kapplication/pdf
Milliken,Selis,Marshall- Detection and analysis of the Chameleon WiFi access point virus.pdf2025-Jan-04 23:47:243.4Mapplication/pdf
Mimno,Li,McCallum- Mixtures of Hierarchical Topics with Pachinko Allocation.pdf2025-Jan-04 23:47:24225.9Kapplication/pdf
Min,Grishman,Wan,Wang,Gondek- Distant Supervision for Relation Extraction with an Incomplete Knowledge Base.pdf2025-Jan-04 23:47:24174.5Kapplication/pdf
Miu,Hui,Lee,Luo,Chung,Wong- Universal DDOS Mitigation Bypass.pdf2025-Jan-04 23:47:24356.7Kapplication/pdf
Moazeni,Coleman,Li- Optimal Portfolio Execution Strategies and Sensitivity to Price Impact Parameters.pdf2025-Jan-04 23:47:241.4Mapplication/pdf
Moerdijk (prepared by Kapulkin)- Fiber Bundles and Univalence.pdf2025-Jan-04 23:47:24243.8Kapplication/pdf
Mohamed,Dahl,Hinton- Acoustic Modeling using Deep Belief Networks.pdf2025-Jan-04 23:47:24222.6Kapplication/pdf
Montanaro,Jazsa,Mitchison- On exact quantum query complexity.pdf2025-Jan-04 23:47:24435.5Kapplication/pdf
Moser,Kruegel,Kirda- Exploring multiple execution paths for malware analysis.pdf2025-Jan-04 23:47:24269.1Kapplication/pdf
Mudge- Network Attack Collaboration.pdf2025-Jan-04 23:47:24904.5Kapplication/pdf
Mueller,Stewart- The Terrorism Delusion.pdf2025-Jan-04 23:47:24221.4Kapplication/pdf
Mulmuley- A Fast Planar Partition Algorithm, II.pdf2025-Jan-04 23:47:241.2Mapplication/pdf
Munro,Nicholson- Succinct Posets.pdf2025-Jan-04 23:47:24413.1Kapplication/pdf
Munro,Raman,Raman,Rao- Succinct Representations of Permutations and Functions.pdf2025-Jan-04 23:47:24327.6Kapplication/pdf
Munro- In as Few Comparisons as Possible.pdf2025-Jan-04 23:47:2468.0Kapplication/pdf
Murphy- The First Level of Super Mario Bros. is Easy with Lexicographic Orderings and Time Travel.pdf2025-Jan-04 23:47:241.4Mapplication/pdf
Mutz,Valeur,Vigna,Kruegel- Anomalous system call detection.pdf2025-Jan-04 23:47:24386.9Kapplication/pdf
Myles,Collberg- k-gram Based Software Birthmarks.pdf2025-Jan-04 23:47:24120.4Kapplication/pdf
Nakibly,Menahem,Waizel,Elovici- Owning the Routing Table Part II.pdf2025-Jan-04 23:47:24161.6Kapplication/pdf
Nanni,Lumini- Local binary patterns for a hybrid fingerprint matcher.pdf2025-Jan-04 23:47:24915.9Kapplication/pdf
Naor,Pinkas- Oblivious Transfer with Adaptive Queries.pdf2025-Jan-04 23:47:24311.0Kapplication/pdf
Narayanan,Shmatikov- De-anonymizing Social Networks.pdf2025-Jan-04 23:47:24254.9Kapplication/pdf
Narayanan,Shmatikov- Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff.pdf2025-Jan-04 23:47:24155.2Kapplication/pdf
Neumann,Schmitt,Carter,Embley,Hare- Psychopathic Traits in Females and Males across the Globe.pdf2025-Jan-04 23:47:24476.4Kapplication/pdf
Neumerkel,Gross- A Sophisticated Solution for Revealing Attacks on Wireless LAN.pdf2025-Jan-04 23:47:24234.3Kapplication/pdf
Newsome,Brumley,Song- Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software.pdf2025-Jan-04 23:47:24175.7Kapplication/pdf
Nguyen,Stern- The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications.pdf2025-Jan-04 23:47:24222.2Kapplication/pdf
Nguyen- Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97.pdf2025-Jan-04 23:47:24211.8Kapplication/pdf
Nicolai- Evolutionary Methods for Learning no-limit Texas Hold'em Poker.pdf2025-Jan-04 23:47:24808.0Kapplication/pdf
Niemi,Levomaki- Evading Deep Inspection for Fun and Shell.pdf2025-Jan-04 23:47:24231.6Kapplication/pdf
Nighswander,Ledvina,Diamond,Brumley,Brumley- GPS Software Attacks.pdf2025-Jan-04 23:47:242.7Mapplication/pdf
Nixon- Denying Service to DDOS Protection Services.pdf2025-Jan-04 23:47:24241.0Kapplication/pdf
O'Connor- CreepyDOL Cheap Distributed Stalking.pdf2025-Jan-04 23:47:2478.9Kapplication/pdf
O'Flynn- Power Analysis Attacks for Cheapskates.pdf2025-Jan-04 23:47:242.1Mapplication/pdf
Ocone,Karatzas- A Generalized Clark Representation Formula, with Applications to Optimal Portfolios.pdf2025-Jan-04 23:47:24985.2Kapplication/pdf
Odean- Do Investors Trade Too Much.pdf2025-Jan-04 23:47:24182.3Kapplication/pdf
Odean- Volume, Volatility, Price and Profit when all Traders are above average.pdf2025-Jan-04 23:47:24266.3Kapplication/pdf
Odlyzko- Economics, Psychology, and Sociology of Security.pdf2025-Jan-04 23:47:2478.9Kapplication/pdf
Oechslin- Making a Faster Cryptanalytic Time-Memory Trade-Off.pdf2025-Jan-04 23:47:24236.9Kapplication/pdf
Ofria,Adami,Collier- Design of Evolvable Computer Languages.pdf2025-Jan-04 23:47:24207.4Kapplication/pdf
Okamoto,Takashima- Decentralized Attribute-Based Signatures.pdf2025-Jan-04 23:47:24329.3Kapplication/pdf
Okamoto- An Artificial Intelligence Membrane to Detect Network Intrusion.pdf2025-Jan-04 23:47:24182.0Kapplication/pdf
Oles- A Category-Theoretic Approach to the Semantics of Programming Languages.pdf2025-Jan-04 23:47:2438.9Mapplication/pdf
Ongaro,Ousterhout- In Search of an Understandable Consensus Algorithm.pdf2025-Jan-04 23:47:24341.4Kapplication/pdf
Ongtang,McLaughlin,Enck,McDaniel- Semantically rich application-centric security in Android.pdf2025-Jan-04 23:47:24742.3Kapplication/pdf
Opdyke- Refactoring Object-Oriented Frameworks.pdf2025-Jan-04 23:47:24749.9Kapplication/pdf
Orlandi,Ostrovsky,Rao,Sahai,Visconti- Statistical Concurrent Non-malleable Zero Knowledge.pdf2025-Jan-04 23:47:24355.5Kapplication/pdf
Orlin- Max flows in O(nm) time, or better.pdf2025-Jan-04 23:47:24522.5Kapplication/pdf
Osborne- Brownian Motion in the Stock Market.pdf2025-Jan-04 23:47:24810.8Kapplication/pdf
Osogami- Analysis of multi-server systems via dimensionality reduction of Markov chains.pdf2025-Jan-04 23:47:251.9Mapplication/pdf
Ossmann,Osborn- Multiplexed Wired Attack Surfaces.pdf2025-Jan-04 23:47:2524.8Kapplication/pdf
Ostrovsky,Yung- How To Withstand Mobile Virus Attacks.pdf2025-Jan-04 23:47:25862.1Kapplication/pdf
Owens,Flatt,Shivers,McMullan- Lexer and Parser Generators in Scheme.pdf2025-Jan-04 23:47:251.0Mapplication/pdf
Owens,Houston,Luebke,Green,Stone,Phillips- GPU Computing.pdf2025-Jan-04 23:47:251.2Mapplication/pdf
Owens,Luebke,Govindaraju,Harris,Kruger,Lefohn,Purcell- A Survey of General-Purpose Computation on Graphics Hardware.pdf2025-Jan-04 23:47:25620.7Kapplication/pdf
Paez,Tomas-Buliart,Forne,Soriano- Securing Agents against Malicious Host in an Intrusion Detection System.pdf2025-Jan-04 23:47:25216.1Kapplication/pdf
Palioudakis,Salomaa,Akl- Unary NFAs with Limited Nondeterminism.pdf2025-Jan-04 23:47:25273.0Kapplication/pdf
Palomba,Riccetti- Portfolio frontiers with restrictions to tracking error volatility and VaR.pdf2025-Jan-04 23:47:25783.7Kapplication/pdf
Pandey- Achieving Constant Round Leakage-Resilient Zero-Knowledge.pdf2025-Jan-04 23:47:25379.5Kapplication/pdf
Pape- Sample or Random Security- A Security Model for Segment-Based Visual Cryptography.pdf2025-Jan-04 23:47:25591.9Kapplication/pdf
Pappas,Polychronakis,Keromytis- Transparent ROP Exploit Mitigation Using Indirect Branch Tracing.pdf2025-Jan-04 23:47:252.4Mapplication/pdf
Parno- Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers.pdf2025-Jan-04 23:47:251.8Mapplication/pdf
Parrilo- Semidefinite programming relaxations for semialgebraic problems.pdf2025-Jan-04 23:47:25247.6Kapplication/pdf
Pascanu,Mikolov,Bengio- On the difficulty of training recurrent neural networks.pdf2025-Jan-04 23:47:25627.5Kapplication/pdf
Paterson,Poettering,Schuldt- Plaintext Recovery Attacks Against WPA-TKIP.pdf2025-Jan-04 23:47:251.7Mapplication/pdf
Patnaik,Sahoo- JavaScript static security analysis made easy with JSPrime.pdf2025-Jan-04 23:47:25141.2Kapplication/pdf
Pauli,Engebretson- Hierarchy-Driven Approach for Attack Patterns in Software Security Education.pdf2025-Jan-04 23:47:25457.2Kapplication/pdf
Pauli,Engebretson- Towards a Specification Prototype for Hierarchy-Driven Attack Patterns.pdf2025-Jan-04 23:47:25450.3Kapplication/pdf
Paulsen- Risk theory in a stochastic economic environment.pdf2025-Jan-04 23:47:251.6Mapplication/pdf
Paxon,Christodorescu,Javed,Rao,Sailer,Schales,Stoecklin,Thomas,Venema,Weaver- Practical Comprehensive Bounds on Surreptitious Communication over DNS.pdf2025-Jan-04 23:47:254.7Mapplication/pdf
Pease,Shostak,Lamport- Reaching Agreement in the Presence of Faults.pdf2025-Jan-04 23:47:25508.6Kapplication/pdf
Peasgood- A Method to Symbolically Compute Convolution Integrals.pdf2025-Jan-04 23:47:25490.5Kapplication/pdf
Peck- Abusing Web APIs through Scripted Android Applications.pdf2025-Jan-04 23:47:2587.8Kapplication/pdf
Pelayo,Warren- Homotopy Type Theory and Voevodsky's Univalent Foundations.pdf2025-Jan-04 23:47:25805.1Kapplication/pdf
Peltzer-Karpf- The Dynamic Landscape of Exceptional Language Development.pdf2025-Jan-04 23:47:25820.5Kapplication/pdf
Percival- Cache Missing for Fun and Profit.pdf2025-Jan-04 23:47:25133.0Kapplication/pdf
Perdisci,Lee,Feamster- Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces.pdf2025-Jan-04 23:47:25561.8Kapplication/pdf
Perkins,Kim,Larsen,Amarasinghe,Bachrach,Carbin,Pacheco,Sherwood,Sidiroglou,Sullivan,Wong,Zibin,Ernst,Rinard- Automatically Patching Errors in Deployed Software.pdf2025-Jan-04 23:47:25254.9Kapplication/pdf
Perriot,Ferrie- Principles and Practise of X-Raying.pdf2025-Jan-04 23:47:25573.6Kapplication/pdf
Peska,Vojtas- Recommending for Disloyal Customers with Low Consumption Rate.pdf2025-Jan-04 23:47:25321.9Kapplication/pdf
Peters,Klein- Ergodicity breaking in Geometric Brownian Motion.pdf2025-Jan-04 23:47:25448.6Kapplication/pdf
Peters- On time and risk.pdf2025-Jan-04 23:47:25367.2Kapplication/pdf
Peters- Optimal leverage from non-ergodicity.pdf2025-Jan-04 23:47:25980.5Kapplication/pdf
Peters- The time resolution of the St Petersburg paradox.pdf2025-Jan-04 23:47:25261.1Kapplication/pdf
Petrusenko,Chan- Incrementally Learning Rules for Anomaly Detection.pdf2025-Jan-04 23:47:251.1Mapplication/pdf
Petschick- Full disk encryption on unmanaged flash devices.pdf2025-Jan-04 23:47:251.3Mapplication/pdf
Pettie,Ramachandran- An Optimal Minimum Spanning Tree Algorithm.pdf2025-Jan-04 23:47:25198.6Kapplication/pdf
Petullo, Solworth- Authentication in Ethos.pdf2025-Jan-04 23:47:25348.4Kapplication/pdf
Petullo, Solworth- Digital Identity Security Architecture in Ethos.pdf2025-Jan-04 23:47:25453.9Kapplication/pdf
Petullo,Fei,Gavlin,Solworth- Ethos's Distributed Types.pdf2025-Jan-04 23:47:25216.6Kapplication/pdf
Petullo,Solworth- SImple-to-use, Secure-by-design Networking in Ethos.pdf2025-Jan-04 23:47:25314.9Kapplication/pdf
Petullo,Solworth- The Lazy Kernel Hacker and Application Programmer.pdf2025-Jan-04 23:47:25170.4Kapplication/pdf
Pham- Optimal Stopping, Free Boundary, and American Option in a Jump-Diffusion Model.pdf2025-Jan-04 23:47:25815.5Kapplication/pdf
Piatek,Isdal,Anderson,Krishnamurthy,Venkataramani- Do Incentives Build Robustness in BitTorrent.pdf2025-Jan-04 23:47:25933.4Kapplication/pdf
Plotkin- A Structural Approach to Operational Semantics.pdf2025-Jan-04 23:47:25612.0Kapplication/pdf
Plyakha,Uppal,Vilkov- Why Does an Equal-Weighted Portfolio Outperform Value- and Price-Weighted Portfolios.pdf2025-Jan-04 23:47:25420.4Kapplication/pdf
Polyakov,Tyurin- Practical Pentesting of ERPS and Business Applications.pdf2025-Jan-04 23:47:251.6Mapplication/pdf
Ponsen,Tuyls,Kaisers,Ramon- An Evolutionary Game-Theoretic Analysis of Poker Strategies.pdf2025-Jan-04 23:47:253.0Mapplication/pdf
Ponsen,Tuyls,de Jong,Ramon,Croonenborghs,Driessens- The Dynamics of Human Behaviour in Poker.pdf2025-Jan-04 23:47:251.1Mapplication/pdf
Poovendran,Baras- An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.pdf2025-Jan-04 23:47:25387.1Kapplication/pdf
Popa,Li,Zeldovich- An Ideal-Security Protocol for Order-Preserving Encoding.pdf2025-Jan-04 23:47:25664.9Kapplication/pdf
Popa,Stark,Helder,Valdez- Building web applications on top of encrypted data using Mylar.pdf2025-Jan-04 23:47:25763.2Kapplication/pdf
Popa,Zeldovich- Multi-Key Searchable Encryption.pdf2025-Jan-04 23:47:25339.9Kapplication/pdf
Prabhakar,Dektar,Gordon- The Regulation of Ant Colony Foraging Activity without Spatial Information.pdf2025-Jan-04 23:47:25682.2Kapplication/pdf
Preis,Kenett,Stanley,Helbing,Ben-Jacob- Quantifying the Behavior of Stock Correlations Under Market Stress.pdf2025-Jan-04 23:47:25989.9Kapplication/pdf
Prieditis- Machine discovery of effective admissible heuristics.pdf2025-Jan-04 23:47:261.5Mapplication/pdf
Proceedings of the 11th European Conference on Information Warfare and Security.pdf2025-Jan-04 23:47:2610.7Mapplication/pdf
Pu,Gupta,Gollakota,Patel- Whole-Home Gesture Recognition Using Wireless Signals.pdf2025-Jan-04 23:47:26429.5Kapplication/pdf
Queiroz,Garg,Tari- A probabilistic model for quantifying the resilience of networked systems.pdf2025-Jan-04 23:47:26848.9Kapplication/pdf
Raber- Virtual Deobfuscator.pdf2025-Jan-04 23:47:26419.0Kapplication/pdf
Rabiner,Juang- An Introduction to HMM.pdf2025-Jan-04 23:47:262.0Mapplication/pdf
Rabinovich,Wigderson-techniques for bounding the convergence rate of genetic algorithms.pdf2025-Jan-04 23:47:26307.6Kapplication/pdf
Radocea,Wicherski- Visualizing Page Tables for Exploitation.pdf2025-Jan-04 23:47:26945.3Kapplication/pdf
Rafler- Generalization of Conway's Game of Life to a continuous domain.pdf2025-Jan-04 23:47:26180.8Kapplication/pdf
Rahman,Huang,Madhyastha,Faloutsos- Efficient and Scalable Socware Detection in Online Social Networks.pdf2025-Jan-04 23:47:26667.2Kapplication/pdf
Ramalingam,Vaswani- Fault Tolerance via Idempotence.pdf2025-Jan-04 23:47:26676.5Kapplication/pdf
Randazzo- Smashing the stack, an example from 2013.pdf2025-Jan-04 23:47:26173.3Kapplication/pdf
Regan,Biswas- Psychometric Modeling of Decision Making Via Game Play.pdf2025-Jan-04 23:47:26240.5Kapplication/pdf
Reina,Fattori,Cavallaro- A system call-centric analysis and stimulation technique to automatically reconstruct android malware behaviors.pdf2025-Jan-04 23:47:26275.8Kapplication/pdf
Riedel- Dynamic coherent risk measures.pdf2025-Jan-04 23:47:26272.9Kapplication/pdf
Rockafellar,Uryasev- Conditional VaR for General Loss Distributions.pdf2025-Jan-04 23:47:26396.3Kapplication/pdf
Romaszko- A Deep Learning Approach with an Ensemble-Based Neural Network Classifier for Black Box ICML2013.pdf2025-Jan-04 23:47:26131.2Kapplication/pdf
Rosenblum,Cooksey,Miller- Virtual Machine-Provided Context Sensitive Page Mappings.pdf2025-Jan-04 23:47:26163.9Kapplication/pdf
Rosenblum,Zhu,Miller,Hunt- Learning to Analyze Binary Computer Code.pdf2025-Jan-04 23:47:26180.7Kapplication/pdf
Roumelis,Vassilakopoulos,Corral,Manolopoulos- A New Plane-Sweep Algorithm for the K-Closest-Pairs Query.pdf2025-Jan-04 23:47:26270.5Kapplication/pdf
Roundy,Miller- Binary-Code Obfuscations in Prevalent Packer Tools.pdf2025-Jan-04 23:47:26518.3Kapplication/pdf
Roundy,Miller- Hybrid Analysis and Control of Malware.pdf2025-Jan-04 23:47:26635.6Kapplication/pdf
Royce- Managing the Development of Large Software Systems.pdf2025-Jan-04 23:47:26433.5Kapplication/pdf
Rubin- Non-monotonic Cryptographic Protocols.pdf2025-Jan-04 23:47:26774.7Kapplication/pdf
Ruiz,Heynmann,Cesar,Miller- Automating Threat Modeling through the Software Development Life-Cycle.pdf2025-Jan-04 23:47:26726.9Kapplication/pdf
Rule,Adams,Ambady,Freeman- Perceptions of dominance following glimpses of faces and bodies.pdf2025-Jan-04 23:47:26897.8Kapplication/pdf
Rule,Ambady- Judgements of power from college yearbook photos and later career success.pdf2025-Jan-04 23:47:26108.0Kapplication/pdf
Rule,Rosen,Slepian,Ambady- Mating interest improves women's accuracy in judging male sexual orientation.pdf2025-Jan-04 23:47:26360.4Kapplication/pdf
Rule,Slepian,Ambady- A memory advantage for untrustworthy faces.pdf2025-Jan-04 23:47:26468.8Kapplication/pdf
Rupp,Dreger,Feldmann,Sommer- Packet Trace Manipulation Framework for Test Labs.pdf2025-Jan-04 23:47:26159.0Kapplication/pdf
Ruvolo,Eaton- Online Multi-Task Learning based on K-SVD.pdf2025-Jan-04 23:47:261.7Mapplication/pdf
Sadjadi,Seyedhosseini,Hassanlou- Fuzzy multi period portfolio selection with different rates for borrowing and lending.pdf2025-Jan-04 23:47:26169.9Kapplication/pdf
Said,Tan,Baker- Personal identification based on handwriting.pdf2025-Jan-04 23:47:26967.6Kapplication/pdf
Sainath,Mohamed,Kingsbury,Ramabhadran- Deep Convolutional Neural Networks for LVCSR.pdf2025-Jan-04 23:47:26160.2Kapplication/pdf
Saint-Jean,Johnson,Boneh,Feigenbaum- Private Web Search.pdf2025-Jan-04 23:47:26243.2Kapplication/pdf
Salapura,Harper,Viswanathan- Resilient cloud computing.pdf2025-Jan-04 23:47:263.2Mapplication/pdf
Salgado- SQL Injection Optimization and Obfuscation Techniques.pdf2025-Jan-04 23:47:26224.0Kapplication/pdf
Samuel,Erlingsson- Let's Parse to Prevent Pwnage.pdf2025-Jan-04 23:47:26130.4Kapplication/pdf
Sander,Ta-Shma- Auditable, Anonymous Electronic Cash.pdf2025-Jan-04 23:47:26222.9Kapplication/pdf
Sauter- The Impact of Tool Design and Media Portrayals in the Success of Activist DDOS Attacks.pdf2025-Jan-04 23:47:26753.7Kapplication/pdf
Saxena,Chung,Ng- 3D Depth Reconstruction from a Single Still Image.pdf2025-Jan-04 23:47:263.0Mapplication/pdf
Saxena,Poosankam,McCamant,Song- Loop-Extended Symbolic Execution on Binary Programs.pdf2025-Jan-04 23:47:26248.2Kapplication/pdf
Sazena,Akhawe,Hanna,Mao,McCamant,Song- A Symbolic Execution Framework for JavaScript.pdf2025-Jan-04 23:47:26410.5Kapplication/pdf
Schlapbach,Liwicki,Bunke- A writer identification system for on-line whiteboard data.pdf2025-Jan-04 23:47:26648.7Kapplication/pdf
Schmedders- Two-Fund Separation in Dynamic General Equilibrium.pdf2025-Jan-04 23:47:27253.7Kapplication/pdf
Schmidhuber- Optimal Ordered Problem Solver.pdf2025-Jan-04 23:47:27324.3Kapplication/pdf
Schmidhuber- Ultimate Cognition a la Godel.pdf2025-Jan-04 23:47:27285.0Kapplication/pdf
Schmidt,Alpcan,Albayrak,Basar,Mueller- A Malware Detector Placement Game for Intrusion Detection.pdf2025-Jan-04 23:47:27302.9Kapplication/pdf
Schoenmakers- A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting.pdf2025-Jan-04 23:47:27262.0Kapplication/pdf
Schroder,Drucker- A Data Parallel Algorithm for Raytracing of Heterogeneous Databases.pdf2025-Jan-04 23:47:27173.1Kapplication/pdf
Schuchard,Geddes,Thompson,Hopper- Routing Around Decoys.pdf2025-Jan-04 23:47:271.9Mapplication/pdf
Schwartz,Avgerinos,Brumley- All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution.pdf2025-Jan-04 23:47:27307.1Kapplication/pdf
Schwartz,Lee,Woo,Brumley- Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring.pdf2025-Jan-04 23:47:272.1Mapplication/pdf
Schwartz- Contractual Anonymity.pdf2025-Jan-04 23:47:27262.4Kapplication/pdf
Schweizer- Option Hedging for Semimartingales.pdf2025-Jan-04 23:47:271.3Mapplication/pdf
Seidel,Voigtlander- Improvements for Free.pdf2025-Jan-04 23:47:27283.9Kapplication/pdf
Senftleben,Bucicoiu,Tews,Armknecht,Katzenbeisser,Sadeghi- MoP-2-MoP- Mobile private microblogging.pdf2025-Jan-04 23:47:27386.1Kapplication/pdf
Senior,Heigold,Ranzato,Yang- An Empirical Study of Learning Rates in Deep Neural Networks for Speech Recognition.pdf2025-Jan-04 23:47:27236.9Kapplication/pdf
Sepehrdad,Vaudenay,Vuagnoux- Discovery and Exploitation of New Biases in RC4.pdf2025-Jan-04 23:47:27401.3Kapplication/pdf
Serrano,Cesar,Heynman,Miller- Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware.pdf2025-Jan-04 23:47:271.0Mapplication/pdf
Setty,Vu,Panpalia,Braun,Blumberg,Walfish- Taking proof-based verified computation a few steps closer to practicality.pdf2025-Jan-04 23:47:27434.9Kapplication/pdf
Shacham,Page,Pfaff,Goh,Modadugu,Boneh- On the Effectiveness of Address-Space Randomization.pdf2025-Jan-04 23:47:27223.1Kapplication/pdf
Shannon- Communication Theory of Secrecy Systems.pdf2025-Jan-04 23:47:27549.3Kapplication/pdf
Sharif,Lanzi,Giffin,Lee- Impeding malware analysis using conditional code obfuscation.pdf2025-Jan-04 23:47:271.0Mapplication/pdf
Shaulov,Brodie- Practical Attacks against Mobile Device Management(MDM) Solutions.pdf2025-Jan-04 23:47:27983.1Kapplication/pdf
Shazeer,Littman,Keim- Solving Crossword Puzzles as Probabilistic Constraint Satisfaction.pdf2025-Jan-04 23:47:27194.5Kapplication/pdf
Shi,Werker- Short-horizon regulation for long-term investors.pdf2025-Jan-04 23:47:271.4Mapplication/pdf
Shinyama- Being Lazy and Preemptive at Learning toward Information Extraction.pdf2025-Jan-04 23:47:27561.6Kapplication/pdf
Shivers- Control-Flow Analysis of Higher-Order Languages.pdf2025-Jan-04 23:47:271.3Mapplication/pdf
Shkatov,Kohlenberg- An Introduction to the UART Hardware Interface.pdf2025-Jan-04 23:47:27644.6Kapplication/pdf
Shmueli,Vaisenberg,Elovici,Glezer- Database Encryption- An Overview of Contemporary Challenges and Design Considerations.pdf2025-Jan-04 23:47:27346.9Kapplication/pdf
Shulman- The univalence axiom for inverse diagrams.pdf2025-Jan-04 23:47:27357.0Kapplication/pdf
Shum,Tang- Common risk factors in returns in Asian emerging stock markets.pdf2025-Jan-04 23:47:27194.1Kapplication/pdf
Silver,Sutton,Muller- Temporal-Difference Search in Computer Go.pdf2025-Jan-04 23:47:271.8Mapplication/pdf
Silver- Reinforcement Learning and Simulation-Based Search in Computer Go.pdf2025-Jan-04 23:47:277.2Mapplication/pdf
Simons,De Weger- Theoretical and computational bounds for m-cycles of the 3n+1 problem.pdf2025-Jan-04 23:47:27714.7Kapplication/pdf
Singh,Gupta,Kaur- A MAC Layer Based Defense Architecture for Reduction-of-Quality (RoQ) Attacks in Wireless LAN.pdf2025-Jan-04 23:47:27643.3Kapplication/pdf
Singh,Sharma,Singh- Design and Develop a Honeypot for Small Scale Organization.pdf2025-Jan-04 23:47:27874.7Kapplication/pdf
Sintsov- Writing JIT Shellcode for fun and profit.pdf2025-Jan-04 23:47:27600.3Kapplication/pdf
Skabar,Cloete- Neural Networks, Financial Trading and the EMH.pdf2025-Jan-04 23:47:27223.6Kapplication/pdf
Skowyra,Casteel,Okhravi,Zeldovich,Streilein- Systematic Analysis of Defenses Against Return-Oriented Programming.pdf2025-Jan-04 23:47:27222.9Kapplication/pdf
Smith,Watts- The investment opportunity set and corporate financing, divided, and compensation policies.pdf2025-Jan-04 23:47:272.0Mapplication/pdf
Smith- An Empirical Analysis of IPO Performance.pdf2025-Jan-04 23:47:27560.6Kapplication/pdf
Smolin- Time and Symmetry in Models of Economic Markets.pdf2025-Jan-04 23:47:27315.2Kapplication/pdf
Smyth,Pironti- Truncating TLS Connections to Violate Beliefs in Web Applications.pdf2025-Jan-04 23:47:27133.3Kapplication/pdf
Sobehart,Farengo- A Dynamical Model of Market Under- and Overreaction.pdf2025-Jan-04 23:47:27250.1Kapplication/pdf
Soeder,Abad,Acevedo- Black-Box Assessment of Pseudorandom Algorithms.pdf2025-Jan-04 23:47:27318.5Kapplication/pdf
Soghoian,Stamm- Detecting and Defeating Government Interception Attacks Against SSL.pdf2025-Jan-04 23:47:27592.9Kapplication/pdf
Solove- I've Got Nothing to Hide and Other Misunderstandings of Privacy.pdf2025-Jan-04 23:47:27295.5Kapplication/pdf
Sommer,Balzarotti,Maier- Recent Advances in Intrusion Detection.pdf2025-Jan-04 23:47:285.9Mapplication/pdf
Sommer- Viable Network Intrusion Detection in High-Performance Environments.pdf2025-Jan-04 23:47:282.1Mapplication/pdf
Song,Royal,Lee- Impeding Automated Malware Analysis with Environment-sensitive Malware.pdf2025-Jan-04 23:47:2863.6Kapplication/pdf
Song,Wagner,Tian- Timing Analysis of Keystrokes and Timing Attacks on SSH.pdf2025-Jan-04 23:47:28362.3Kapplication/pdf
Sontag,Roy-Complexity of Inferencein Latent Dirichlet Allocation.pdf2025-Jan-04 23:47:28509.9Kapplication/pdf
Sparse Distributed Memory and Related Models.pdf2025-Jan-04 23:47:28339.4Kapplication/pdf
Spill,Kershaw,Ossmann- Physical Layer Tapping with Project Daisho.pdf2025-Jan-04 23:47:28146.5Kapplication/pdf
Spivak- Category Theory for Scientists.pdf2025-Jan-04 23:47:284.6Mapplication/pdf
Spoon,Shivers- Semantic Navigation of Large Code Bases in Higher-Order, Dynamically Typed Languages.pdf2025-Jan-04 23:47:28212.8Kapplication/pdf
Spoonhower,Blelloch,Gibbons,Harper- Space Profiling for Parallel Functional Programs.pdf2025-Jan-04 23:47:28482.1Kapplication/pdf
Spoonhower,Blelloch,Harper- A Semantic Framework for Scheduling Parallel Programs.pdf2025-Jan-04 23:47:28504.7Kapplication/pdf
Sridharan- Refinement-Based Program Analysis Tools.pdf2025-Jan-04 23:47:281.9Mapplication/pdf
Srivastava,Giffin- Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections.pdf2025-Jan-04 23:47:28589.6Kapplication/pdf
Stadler,Piveteau,Camenisch- Fair Blind Signatures.pdf2025-Jan-04 23:47:28155.8Kapplication/pdf
Standaert,Malkin,Yung- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks.pdf2025-Jan-04 23:47:281.0Mapplication/pdf
Stanek,Sorniotti,Androulaki,Kencl- A Secure Data Deduplication Scheme for Cloud Storage.pdf2025-Jan-04 23:47:28659.4Kapplication/pdf
Staniford,Paxson,Weaver- How to Own the Internet in Your Spare Time.pdf2025-Jan-04 23:47:28312.8Kapplication/pdf
Staton,Levy- Universal Properties of Impure Programming Languages.pdf2025-Jan-04 23:47:28436.9Kapplication/pdf
Steil- Dynamic Re-compilation of Binary RISC Code for CISC Architectures.pdf2025-Jan-04 23:47:28806.4Kapplication/pdf
Stevens- On Collisions for MD5.pdf2025-Jan-04 23:47:28651.0Kapplication/pdf
Stone- Pixel Perfect Timing Attacks with HTML5.pdf2025-Jan-04 23:47:28841.2Kapplication/pdf
Streicher,Hofmann- The Groupoid Interpretation of Type Theory.ps.gz2025-Jan-04 23:47:28102.9Ktext/plain
Streicher- A model of type theory in simplicial sets.pdf2025-Jan-04 23:47:28365.3Kapplication/pdf
Suchorzewski,Clune- A novel generative encoding for evolving modular, regular and scalable networks.pdf2025-Jan-04 23:47:28445.0Kapplication/pdf
Sudholt-Computational Complexity of Evolutionary Algorithms, Hybridizations, and Swarm Intelligence.pdf2025-Jan-04 23:47:282.0Mapplication/pdf
Sun,Chen,Xu,Kong- An Image Encryption Algorithm Utilizing Julia Sets and Hilbert Curves.pdf2025-Jan-04 23:47:287.8Mapplication/pdf
Sutskever,Martens,Dahl,Hinton- On the importance of initialization and momentum in deep learning.pdf2025-Jan-04 23:47:28464.6Kapplication/pdf
Sutskever,Martens,Hinton- Generating Text with Recurrent Neural Networks.pdf2025-Jan-04 23:47:28266.9Kapplication/pdf
Sutskever,Nair- Mimicking Go Experts with Convolutional Neural Networks.pdf2025-Jan-04 23:47:28173.4Kapplication/pdf
Sutskever- Training Recurrent Neural Networks.pdf2025-Jan-04 23:47:283.2Mapplication/pdf
Sweha,Bestavros,Matta- Enhancing Tor Performance For Bandwidth-Intensive Applications.pdf2025-Jan-04 23:47:29549.6Kapplication/pdf
Syverson- Practical Vulnerabilities of the Tor Anonymity Network.pdf2025-Jan-04 23:47:29242.7Kapplication/pdf
Tackett,Slobodskaya,Mar,Deal,Halverson,Baker,Pavlopoulos,Besevegis- The hierarchical structure of childhood personality in five countries.pdf2025-Jan-04 23:47:292.8Mapplication/pdf
Tafarodi,Ho- In defense of insecurity.pdf2025-Jan-04 23:47:29322.5Kapplication/pdf
Tafarodi,Lo,Yamaguchi,Lee,Katsura- The inner self in three countries.pdf2025-Jan-04 23:47:29133.2Kapplication/pdf
Tafarodi,Marshall,Katsura- Standing out in Canada and Japan.pdf2025-Jan-04 23:47:29155.0Kapplication/pdf
Tafarodi,Tam,Milne- Selective memory and the persistence of paradoxical self-esteem.pdf2025-Jan-04 23:47:2990.9Kapplication/pdf
Tafarodi- Toward a cultural phenomenology of personal identity.pdf2025-Jan-04 23:47:296.7Mapplication/pdf
Taleb,Douady- Mathematical Definition, Mapping, and Detection of (Anti)Fragility.pdf2025-Jan-04 23:47:292.6Mapplication/pdf
Tandon,Chan,Mitra- Data Cleaning and Enriched Representations for Anomaly Detection in System Calls.pdf2025-Jan-04 23:47:29221.1Kapplication/pdf
Tandon,Chan- Increasing coverage to improve detection of network and host anomalies.pdf2025-Jan-04 23:47:29337.9Kapplication/pdf
Tandon,Chan- On the Learning of System Call Attributes for Host-Based Anomaly Detection.pdf2025-Jan-04 23:47:29203.6Kapplication/pdf
Tang,Salakhutdinov- A New Learning Algorithm for Stochastic Feedforward Neural Nets.pdf2025-Jan-04 23:47:293.3Mapplication/pdf
Tang,Tsitsiashvili- Precise estimates for the ruin probability in finite horizon in a discrete-time model with heavy-tailed insurance and financial risks.pdf2025-Jan-04 23:47:29378.5Kapplication/pdf
Tang- Deep Learning using Linear SVMs.pdf2025-Jan-04 23:47:29617.5Kapplication/pdf
Tapiador,Salvachua- Content Management in Ruby on Rails.pdf2025-Jan-04 23:47:2972.8Kapplication/pdf
Taylor,Dusparic,Galvan-Lopez,Clarke,Cahill- Transfer Learning in Multi-Agent Systems Through Parallel Transfer.pdf2025-Jan-04 23:47:29405.5Kapplication/pdf
Temmingh,MacPherson- Maltego Tungsten as a Collaborative Attack Platform.pdf2025-Jan-04 23:47:29532.9Kapplication/pdf
Terry- Replicated Data Consistentcy Explained Through Baseball.pdf2025-Jan-04 23:47:292.9Mapplication/pdf
Tesauro,Gondek,Lenchner,Fan,Prager- Simulation, learning, and optimization techniques in Watson's game strategies.pdf2025-Jan-04 23:47:29964.6Kapplication/pdf
Thomas,Clare,Smith,Seaton- Risk Parity, Momentum, and Trend Following in Global Asset Allocation.pdf2025-Jan-04 23:47:29977.5Kapplication/pdf
Thusoo,Sarma,Jain,Shao,Chakka,Zhang,Antony,Liu,Murthy- Hive- A Petabyte Scale Data Warehouse Using Hadoop.pdf2025-Jan-04 23:47:29427.7Kapplication/pdf
Topor- Functional Programs for Generating Permutations.pdf2025-Jan-04 23:47:294.2Mapplication/pdf
Towers Watson- The Irreversibility of Time.pdf2025-Jan-04 23:47:29504.9Kapplication/pdf
Trend Micfo- Detecting APT Activity with Network Traffic Analysis.pdf2025-Jan-04 23:47:292.1Mapplication/pdf
Trend Micro- A Look at HTML5 Attack Scenarios.pdf2025-Jan-04 23:47:303.2Mapplication/pdf
Trend Micro- Adding Android and Mac OSX Malware to the APT Toolbox.pdf2025-Jan-04 23:47:301.2Mapplication/pdf
Trend Micro- Asprox Reborn.pdf2025-Jan-04 23:47:301.8Mapplication/pdf
Trend Micro- Automating Online Banking Fraud- Automatic Transfer System.pdf2025-Jan-04 23:47:301.3Mapplication/pdf
Trend Micro- Continuous Monitoring in a Virtual Environment.pdf2025-Jan-04 23:47:30625.0Kapplication/pdf
Trend Micro- Dissecting the LURID APT- campaign, attacks, tactics and victims.pdf2025-Jan-04 23:47:301.0Mapplication/pdf
Trend Micro- Home Automation and Cybercrime.pdf2025-Jan-04 23:47:304.1Mapplication/pdf
Trend Micro- Police Ransomware Update.pdf2025-Jan-04 23:47:30510.3Kapplication/pdf
Trend Micro- Russian Underground 101.pdf2025-Jan-04 23:47:300.9Mapplication/pdf
Trend Micro- SCADA in the Cloud.pdf2025-Jan-04 23:47:30754.9Kapplication/pdf
Trend Micro- The Crimeware Evolution.pdf2025-Jan-04 23:47:302.2Mapplication/pdf
Trend Micro- The HeartBeat APT Campaign.pdf2025-Jan-04 23:47:302.9Mapplication/pdf
Trend Micro- The Police Trojan.pdf2025-Jan-04 23:47:301.2Mapplication/pdf
Trend Micro- The Taidoor Campaign.pdf2025-Jan-04 23:47:30722.7Kapplication/pdf
Trend Micro- Toward a More Secure Posture for Industrial Control System Networks.pdf2025-Jan-04 23:47:30905.3Kapplication/pdf
Trend Micro- Traffic Direction Systems as Malware Distribution Tools.pdf2025-Jan-04 23:47:303.3Mapplication/pdf
Trend Micro- Trends in Targeted Attacks.pdf2025-Jan-04 23:47:30396.5Kapplication/pdf
Trend Micro- Who's Really Attacking Your ICS Equipment.pdf2025-Jan-04 23:47:30711.1Kapplication/pdf
Tse,Forsyth,Kennedy,Windcliff- Comparison between the Mean Variance optimal and the Mean Quadratic Variation optimal trading strategies.pdf2025-Jan-04 23:47:301.2Mapplication/pdf
Tsuruta,Inenaga,Bannai,Takeda- Shortest Unique Substrings Queries in Optimal Time.pdf2025-Jan-04 23:47:30310.7Kapplication/pdf
Tu,Kaashoek,Madden,Zeldovich- Processing Analytical Queries over Encrypted Data.pdf2025-Jan-04 23:47:30376.6Kapplication/pdf
Tucek,Xiong,Zhou- Efficient Online Validation with Delta Execution.pdf2025-Jan-04 23:47:30278.4Kapplication/pdf
UK Wireless Networking Hijacking.pdf2025-Jan-04 23:47:30465.9Kapplication/pdf
Unno,Terauchi,Kobayashi- Automating Relatively Complete Verification of Higher-Order Functional Programs.pdf2025-Jan-04 23:47:30309.8Kapplication/pdf
Van De Vanter- A Formalization and Correctness Proof of the CGOL Language System.pdf2025-Jan-04 23:47:303.2Mapplication/pdf
Vardoulakis,Shivers- Ordering Multiple Continuations on the Stack.pdf2025-Jan-04 23:47:30258.5Kapplication/pdf
Vardoulakis,Shivers- Pushdown Flow Analysis of First-Class Control.pdf2025-Jan-04 23:47:30317.9Kapplication/pdf
Vasek,Moore- Identifying Risk Factors for Webserver Compromise.pdf2025-Jan-04 23:47:30219.5Kapplication/pdf
Vasquez-Fernandez,Coello,Troncoso- An Evolutionary Algo coupled with the Hooke-Jeeves Algo for Tuning a Chess Evaluation Function.pdf2025-Jan-04 23:47:30781.9Kapplication/pdf
Vasudevan,Chaki,Jia,McCune,Newsome,Datta- Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.pdf2025-Jan-04 23:47:30336.4Kapplication/pdf
Vaudenay- Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS.pdf2025-Jan-04 23:47:30125.6Kapplication/pdf
Vazirani- A Survey of Quantum Complexity Theory.pdf2025-Jan-04 23:47:31371.6Kapplication/pdf
Vazou,Rondon,Jhala- Abstract Refinement Types.pdf2025-Jan-04 23:47:31341.9Kapplication/pdf
Veach- Robust Monte Carlo Methods for Light Transport Simulation.pdf2025-Jan-04 23:47:314.9Mapplication/pdf
Vecchiola,Anjomshoa,Bernstein,Dumitrscu,Garnavi,von Kanel,Wightwick- Engineering resilient information systems for emergency management.pdf2025-Jan-04 23:47:311.3Mapplication/pdf
Venkatachalam,Stamp- Detecting Undetectable Metamorphic Viruses.pdf2025-Jan-04 23:47:31526.3Kapplication/pdf
Viehbock- Brute forcing Wi-Fi Protected Setup.pdf2025-Jan-04 23:47:31896.1Kapplication/pdf
Visser,Havelund,Brat,Park,Lerda- Model Checking Programs.pdf2025-Jan-04 23:47:31201.5Kapplication/pdf
Vrable,Ma,Chen,Moore,Vandekieft,Cnoeren,Voelker,Savage- Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm.pdf2025-Jan-04 23:47:31435.2Kapplication/pdf
Wadler- Comprehending Monads.pdf2025-Jan-04 23:47:31227.3Kapplication/pdf
Wadler- Propositions as Types.pdf2025-Jan-04 23:47:31222.3Kapplication/pdf
Wahlisch,Trapp,Keil,Schonfelder,Schmidt,Schiller- First Insights from a Mobile Honeypot.pdf2025-Jan-04 23:47:311.0Mapplication/pdf
Waksman,Sethumadhavan- Silencing Hardware Backdoors.pdf2025-Jan-04 23:47:31720.5Kapplication/pdf
Wald,Slusallek- State of the Art in Interactive Ray Tracing.pdf2025-Jan-04 23:47:312.5Mapplication/pdf
Wald- Realtime Ray Tracing and Interactive Global Illumination.pdf2025-Jan-04 23:47:3234.5Mapplication/pdf
Wang,Barrett,Wies- Cascade 2.0.pdf2025-Jan-04 23:47:32325.5Kapplication/pdf
Wang,Chen,Jia,Zeldovich,Kaashoek- Improving Integer Security for Systems with KINT.pdf2025-Jan-04 23:47:32208.4Kapplication/pdf
Wang,Forsyth- Comparison of Mean Variance-like Strategies for Optimal Asset Allocation Problems.pdf2025-Jan-04 23:47:321.0Mapplication/pdf
Wang,Forsyth- Numerical Solution of the Hamilton-Jacobi-Bellman Formulation for Continuous Time Mean Variance Asset Allocation.pdf2025-Jan-04 23:47:32446.4Kapplication/pdf
Wang,Goldberg- Improved Website Fingerprinting on Tor.pdf2025-Jan-04 23:47:32263.0Kapplication/pdf
Wang,Grier,Moshchuk,King,Choudhury,Venter- The Multi-Principal OS Construction of the Gazella Web Browser.pdf2025-Jan-04 23:47:32255.0Kapplication/pdf
Wang,Jiang,Cui,Ning- Countering Kernel Rootkits with Lightweight Hook Protection.pdf2025-Jan-04 23:47:32188.3Kapplication/pdf
Wang,Mahadevan- Manifold Alignment Preserving Global Geometry.pdf2025-Jan-04 23:47:32275.9Kapplication/pdf
Wang,Mahadevan- Multiscale Manifold Learning.pdf2025-Jan-04 23:47:32829.5Kapplication/pdf
Wang,Murmuria,Stavrou- Implementing and Optimizing an Encryption Filesystem on Android.pdf2025-Jan-04 23:47:321.2Mapplication/pdf
Wang,Sun,Mouha,Preneel- Algebraic Techniques in Differential Cryptanalysis Revisited.pdf2025-Jan-04 23:47:32229.3Kapplication/pdf
Wang,Wu,Cunningham,Zou- Honeypot Detection in Advanced Botnet Attacks.pdf2025-Jan-04 23:47:32498.8Kapplication/pdf
Wang,Yin,Yu- Finding Collisions in the Full SHA-1.pdf2025-Jan-04 23:47:32468.5Kapplication/pdf
Wang,Yiu,Mak- Optimal inventory policy with fixed and proportional transaction costs under a risk constraint.pdf2025-Jan-04 23:47:32900.9Kapplication/pdf
Wang,Yu- How to Break MD5 and Other Hash Functions.pdf2025-Jan-04 23:47:32184.4Kapplication/pdf
Warren- The strict omega-groupoid interpretation of type theory.pdf2025-Jan-04 23:47:321.2Mapplication/pdf
Watrous- Quantum Computational Complexity.pdf2025-Jan-04 23:47:32356.9Kapplication/pdf
Weaver,Sommer,Paxson- Detecting Forged TCP Reset Packets.pdf2025-Jan-04 23:47:32212.1Kapplication/pdf
Weber- Distribution-Invariant Dynamic Risk Measures.pdf2025-Jan-04 23:47:32297.3Kapplication/pdf
Wei,Gomez,Neamtiu,Faloutsos- Permission Evolution in the Android Ecosystem.pdf2025-Jan-04 23:47:32366.7Kapplication/pdf
Weinstein- Migration for the benefit of all.pdf2025-Jan-04 23:47:32749.9Kapplication/pdf
Weir,Aggarwal,Collins,Stern- Testing Metrics for Password Creation Policies by Attacking Large Sets of Revealed Passwords.pdf2025-Jan-04 23:47:32624.2Kapplication/pdf
Weir,Aggarwal,de Medeiros,Glodek- Password Cracking Using Probabilistic CFG.pdf2025-Jan-04 23:47:32541.5Kapplication/pdf
Wellman- The Economic Approach to Artificial Intelligence.pdf2025-Jan-04 23:47:32260.8Kapplication/pdf
Weston,Ratle,Mobahi,Collobert- Deep Learning via Semi-Supervised Embedding.pdf2025-Jan-04 23:47:32873.5Kapplication/pdf
Wheeler,Needham- TEA, a Tiny Encryption Algorithm.pdf2025-Jan-04 23:47:32169.0Kapplication/pdf
Willems,Feiling- Reverse Code Engineering- State of the Art and Countermeasures.pdf2025-Jan-04 23:47:32579.5Kapplication/pdf
Williams- Post Exploitation Operations with Cloud Synchronization Services.pdf2025-Jan-04 23:47:321.5Mapplication/pdf
Williamson,Harpur,Hare- Abnormal Processing of Affective Words by Psychopaths.pdf2025-Jan-04 23:47:324.1Mapplication/pdf
Wilson,Gilbert- Affective Forecasting.pdf2025-Jan-04 23:47:323.3Mapplication/pdf
Wilson,Lindsey,Schooler- A Model of Dual Attitudes.pdf2025-Jan-04 23:47:332.3Mapplication/pdf
Wimberley,Harrison- Modern Overflow Targets.pdf2025-Jan-04 23:47:33243.9Kapplication/pdf
Winant,Devriese,Piessens,Schrijvers- Partial Type Signatures for Haskell.pdf2025-Jan-04 23:47:33356.8Kapplication/pdf
Winter,Lindskog- How China Is Blocking Tor.pdf2025-Jan-04 23:47:33751.7Kapplication/pdf
Wirch,Hardy- Ordering of Risk Measures for Capital Adequacy.pdf2025-Jan-04 23:47:33488.1Kapplication/pdf
Xie,Xu,Chuang- Horizontal and Vertical Ensemble with Deep Representation for Classification.pdf2025-Jan-04 23:47:33328.3Kapplication/pdf
Xu,Huang,Fox,Patterson,Jordan- Detecting Large-Scale System Problems by Mining Console Logs.pdf2025-Jan-04 23:47:33314.3Kapplication/pdf
Xu,Wang,Xie- New Trends in FastFlux Networks.pdf2025-Jan-04 23:47:33368.0Kapplication/pdf
Yamakami- Oracle Pushdown Automata, Nondeterministic Reducibilities, and the Hierarchy over the Family of Context-Free Languages.pdf2025-Jan-04 23:47:33246.4Kapplication/pdf
Yang,Culberson,Holte,Zahavi,Felner- A General Theory of Additive State Space Abstractions.pdf2025-Jan-04 23:47:33405.5Kapplication/pdf
Yang,Stefan,Mitchell,Mazieres,Marchenko,Karp- Toward Principled Browser Security.pdf2025-Jan-04 23:47:33112.8Kapplication/pdf
Yang,Xiang,Kong,Zhou- A GPGPU Compiler for Memory Optimization and Parallelism Management.pdf2025-Jan-04 23:47:33230.6Kapplication/pdf
Yang,Zhang- Drift-Independent Volatility Estimation Based on High, Low, Open, and Close Prices.pdf2025-Jan-04 23:47:33134.0Kapplication/pdf
Yao- Protocols for Secure Computations (extended abstract).pdf2025-Jan-04 23:47:33115.6Kapplication/pdf
Yao- Theory and Applications of Trapdoor Functions.pdf2025-Jan-04 23:47:331.6Mapplication/pdf
Yarowsky- Unsupervised Word Sense Disambiguation Rivaling Supervised Methods.pdf2025-Jan-04 23:47:33823.4Kapplication/pdf
Yazdanpanah,Alvarez-Martinez,Jimenez-Gonzalez,Etsion- Hybrid Dataflow-von-Neumann Architectures.pdf2025-Jan-04 23:47:332.0Mapplication/pdf
Ye,Lam,Dai- Cryptanalysis of 2R Schemes.pdf2025-Jan-04 23:47:33264.4Kapplication/pdf
Young- Executing Commands on zOS through FTP.pdf2025-Jan-04 23:47:331.1Mapplication/pdf
Yu,Gibbons,Kaminsky,Xiao- A Near-Optimal Social Network Defense against Sybil Attacks.pdf2025-Jan-04 23:47:33421.8Kapplication/pdf
Yu,Vahdat- Design and Evaluation of a Continuous Consistency Model for Replicated Services.pdf2025-Jan-04 23:47:33143.9Kapplication/pdf
Yuan,Zheng,Park,Zhou,Savage- Improving Software Diagnosability via Log Enhancement.pdf2025-Jan-04 23:47:331.2Mapplication/pdf
Yuen,Syverson,Liu,Thorpe- Intention-Disguised Algorithmic Trading.pdf2025-Jan-04 23:47:33267.8Kapplication/pdf
Zaddach,Costin- Embedded Devices Security and Firmware Reverse Engineering.pdf2025-Jan-04 23:47:33873.9Kapplication/pdf
Zamfir,Kasikci,Kinder,Bugnion,Candea- Automated Debugging for Arbitrarily Long Executions.pdf2025-Jan-04 23:47:33138.3Kapplication/pdf
Zeilberger- The Logical Basis of Evaluation Order and Pattern-Matching.pdf2025-Jan-04 23:47:331.3Mapplication/pdf
Zeller- Isolating Cause-Effect Chains from Computer Programs.pdf2025-Jan-04 23:47:33598.7Kapplication/pdf
Zhang,Juels,Reiter,Ristenpart- Cross-VM Side Channels and Their Use to Extract Private Keys.pdf2025-Jan-04 23:47:33990.5Kapplication/pdf
Zhang,Porras,Ullrich- Highly Predictive Blacklisting.pdf2025-Jan-04 23:47:33421.1Kapplication/pdf
Zhang,Sekar- Control Flow Integrity for COTS Binaries.pdf2025-Jan-04 23:47:331.9Mapplication/pdf
Zhang,Wang,Luo,Liu- Cross-Site Scripting Attacks in Social Networks APIs.pdf2025-Jan-04 23:47:33671.3Kapplication/pdf
Zhang,Wei,Chen,Duan,McCamant,Szekeres,Song,Zou- Practical Control Flow Integrity and Randomization for Binary Executables.pdf2025-Jan-04 23:47:33221.2Kapplication/pdf
Zhang,Yamagiwa,Okumura,Yunoki- Kernel Polynomial Method on GPU.pdf2025-Jan-04 23:47:331.3Mapplication/pdf
Zhao,Nagarakatte,Martin,Zdancewic- Formal Verification of SSA-Based Optimizations for LLVM.pdf2025-Jan-04 23:47:33361.6Kapplication/pdf
Zhao,Wei,Wang- On the Dividend Strategies with Non-Exponential Discounting.pdf2025-Jan-04 23:47:33354.2Kapplication/pdf
Zhou,Zhang,Jiang,Freeh- Taming Information-Stealing Smartphone Applications (on Android).pdf2025-Jan-04 23:47:33366.9Kapplication/pdf
Zhu,Coleman,Li- Min-Max Robust and CVaR Robust Mean-Variance Portfolios.pdf2025-Jan-04 23:47:33549.1Kapplication/pdf
Zou,Deng- Detection of Fabrication CTS Packet Attacks in Wireless LANs.pdf2025-Jan-04 23:47:33144.3Kapplication/pdf
de Amorim,Collins,DeHon,Demange,Hritcu,Pichardie,Pierce,Pollack,Tolmach- A Verified Information-Flow Architecture.pdf2025-Jan-04 23:47:33560.0Kapplication/pdf
del Barrio- Study of the techniques for emulation programming.pdf2025-Jan-04 23:47:33836.5Kapplication/pdf
van den Berg,Garner- Types are weak omega-groupoids.pdf2025-Jan-04 23:47:33309.7Kapplication/pdf
von Solms,Naccache- On Blind Signatures and Perfect Crimes.pdf2025-Jan-04 23:47:33253.0Kapplication/pdf
Cette page est une directory listing. HTTPS does work.