Seguir
Martin Abadi
Martin Abadi
Research Scientist, Google, and Professor Emeritus, UC Santa Cruz
Dirección de correo verificada de cs.ucsc.edu - Página principal
Título
Citado por
Citado por
Año
TensorFlow: large-scale machine learning on heterogeneous distributed systems
M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ...
arXiv preprint arXiv:1603.04467 172, 2015
33478*2015
TensorFlow: a system for large-scale machine learning.
M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ...
OSDI 16, 265-283, 2016
275362016
Deep learning with differential privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
73902016
A logic of authentication
M Burrows, M Abadi, R Needham
Proc. R. Soc. Lond. A 426 (1871), 233-271, 1989
56181989
Control-Flow Integrity: Principles, Implementations, and Applications
M Abadi, M Budiu, Ú Erlingsson, J Ligatti
ACM Transactions on Information and System Security-TISSEC 13 (1), 2009
26812009
A calculus for cryptographic protocols: The spi calculus
M Abadi, AD Gordon
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
21361997
A theory of objects
M Abadi, L Cardelli
Springer, 1996
2071*1996
The existence of refinement mappings
M Abadi, L Lamport
Theoretical Computer Science 82 (2), 253-284, 1991
15181991
Mobile values, new names, and secure communication
M Abadi, C Fournet
ACM Sigplan Notices 36 (3), 104-115, 2001
12762001
Semi-supervised knowledge transfer for deep learning from private training data
N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar
arXiv preprint arXiv:1610.05755, 2016
12622016
Explicit substitutions
M Abadi, L Cardelli, PL Curien, JJ Lévy
Journal of Functional Programming 6 (2), 299-327, 1996
1247*1996
Authentication in distributed systems: Theory and practice
B Lampson, M Abadi, M Burrows, E Wobber
ACM Transactions on Computer Systems (TOCS) 10 (4), 265-310, 1992
11701992
Naiad: a timely dataflow system
DG Murray, F McSherry, R Isaacs, M Isard, P Barham, M Abadi
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
11532013
Adversarial patch
TB Brown, D Mané, A Roy, M Abadi, J Gilmer
arXiv preprint arXiv:1712.09665, 2017
11132017
Prudent engineering practice for cryptographic protocols
M Abadi, R Needham
IEEE transactions on Software Engineering 22 (1), 6-15, 1996
10471996
A calculus for access control in distributed systems
M Abadi, M Burrows, B Lampson, G Plotkin
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (4), 706-734, 1993
8381993
Composing specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 73-132, 1993
8201993
Conjoining specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 17 (3), 507-535, 1995
6701995
A semantics for a logic of authentication
M Abadi, MR Tuttle
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
602*1991
XFI: Software guards for system address spaces
U Erlingsson, M Abadi, M Vrable, M Budiu, GC Necula
Proceedings of the 7th symposium on Operating systems design and …, 2006
5962006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20