Martin Abadi
Martin Abadi
Principal Scientist, Google, and Professor Emeritus, UC Santa Cruz
Dirección de correo verificada de - Página principal
TítuloCitado porAño
Tensorflow: Large-scale machine learning on heterogeneous distributed systems. 2016
M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ...
arXiv preprint arXiv:1603.04467 3, 2016
TensorFlow: a system for large-scale machine learning.
M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ...
OSDI 16, 265-283, 2016
A logic of authentication
M Burrows, M Abadi, R Needham
Proc. R. Soc. Lond. A 426 (1871), 233-271, 1989
A Logic of Authentication
M Burrows, M Abadi, R Needham
Technical Report 39, February, 1989
A calculus for cryptographic protocols: The spi calculus
M Abadi, AD Gordon
Information and computation 148 (1), 1-70, 1999
A theory of objects
M Abadi, L Cardelli
Springer, 1996
Control-flow integrity
M Abadi, M Budiu, U Erlingsson, J Ligatti
Proc. ACM Conference and Computer and Communications Security (CCS), 2005
Control-Flow Integrity: Principles, Implementations, and Applications
M Abadi, M Budiu, Ú Erlingsson, J Ligatti
ACM Transactions on Information and System Security-TISSEC 13 (1), 2009
The existence of refinement mappings
M Abadi, L Lamport
Theoretical Computer Science 82 (2), 253-284, 1991
Mobile values, new names, and secure communication
M Abadi, C Fournet
ACM Sigplan Notices 36 (3), 104-115, 2001
Explicit substitutions
M Abadi, L Cardelli, PL Curien, JJ Lévy
Journal of Functional Programming 6 (2), 299-327, 1996
Authentication in distributed systems: Theory and practice
B Lampson, M Abadi, M Burrows, E Wobber
ACM Transactions on Computer Systems (TOCS) 10 (4), 265-310, 1992
Prudent engineering practice for cryptographic protocols
M Abadi, R Needham
IEEE transactions on Software Engineering 22 (1), 6-15, 1996
Deep learning with differential privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
A calculus for access control in distributed systems
M Abadi, M Burrows, B Lampson, G Plotkin
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (4), 706-734, 1993
Composing specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 73-132, 1993
Naiad: a timely dataflow system
DG Murray, F McSherry, R Isaacs, M Isard, P Barham, M Abadi
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
Conjoining specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 17 (3), 507-535, 1995
Access control subsystem and method for distributed computer system using locally cached authentication credentials
E Wobber, M Abadi, A Birrell, B Lampson
US Patent 5,235,642, 1993
A semantics for a logic of authentication
M Abadi, MR Tuttle
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20