Volgen
Martin Abadi
Martin Abadi
Research Scientist, Google, and Professor Emeritus, UC Santa Cruz
Geverifieerd e-mailadres voor cs.ucsc.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
TensorFlow: large-scale machine learning on heterogeneous distributed systems
M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ...
arXiv preprint arXiv:1603.04467 172, 2015
32769*2015
TensorFlow: a system for large-scale machine learning.
M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ...
OSDI 16, 265-283, 2016
269702016
Deep learning with differential privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
70082016
A logic of authentication
M Burrows, M Abadi, R Needham
Proc. R. Soc. Lond. A 426 (1871), 233-271, 1989
55851989
Control-Flow Integrity: Principles, Implementations, and Applications
M Abadi, M Budiu, Ú Erlingsson, J Ligatti
ACM Transactions on Information and System Security-TISSEC 13 (1), 2009
26612009
A calculus for cryptographic protocols: The spi calculus
M Abadi, AD Gordon
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
21321997
A theory of objects
M Abadi, L Cardelli
Springer, 1996
2068*1996
The existence of refinement mappings
M Abadi, L Lamport
Theoretical Computer Science 82 (2), 253-284, 1991
15141991
Mobile values, new names, and secure communication
M Abadi, C Fournet
ACM Sigplan Notices 36 (3), 104-115, 2001
12712001
Explicit substitutions
M Abadi, L Cardelli, PL Curien, JJ Lévy
Journal of Functional Programming 6 (2), 299-327, 1996
1239*1996
Semi-supervised knowledge transfer for deep learning from private training data
N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar
arXiv preprint arXiv:1610.05755, 2016
12252016
Authentication in distributed systems: Theory and practice
B Lampson, M Abadi, M Burrows, E Wobber
ACM Transactions on Computer Systems (TOCS) 10 (4), 265-310, 1992
11681992
Naiad: a timely dataflow system
DG Murray, F McSherry, R Isaacs, M Isard, P Barham, M Abadi
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
11432013
Adversarial patch
TB Brown, D Mané, A Roy, M Abadi, J Gilmer
arXiv preprint arXiv:1712.09665, 2017
10692017
Prudent engineering practice for cryptographic protocols
M Abadi, R Needham
IEEE transactions on Software Engineering 22 (1), 6-15, 1996
10471996
A calculus for access control in distributed systems
M Abadi, M Burrows, B Lampson, G Plotkin
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (4), 706-734, 1993
8351993
Composing specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 73-132, 1993
8211993
Conjoining specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 17 (3), 507-535, 1995
6701995
A semantics for a logic of authentication
M Abadi, MR Tuttle
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
601*1991
XFI: Software guards for system address spaces
U Erlingsson, M Abadi, M Vrable, M Budiu, GC Necula
Proceedings of the 7th symposium on Operating systems design and …, 2006
5892006
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20