Seguir
Martin Abadi
Martin Abadi
Research Scientist, Google, and Professor Emeritus, UC Santa Cruz
Dirección de correo verificada de cs.ucsc.edu - Página principal
Título
Citado por
Citado por
Año
TensorFlow: a system for large-scale machine learning.
M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ...
OSDI 16, 265-283, 2016
311782016
TensorFlow: large-scale machine learning on heterogeneous distributed systems
M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ...
arXiv preprint arXiv:1603.04467 172, 2015
24444*2015
Deep learning with differential privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
58002016
A logic of authentication
M Burrows, M Abadi, R Needham
Proc. R. Soc. Lond. A 426 (1871), 233-271, 1989
54621989
Control-Flow Integrity: Principles, Implementations, and Applications
M Abadi, M Budiu, Ú Erlingsson, J Ligatti
ACM Transactions on Information and System Security-TISSEC 13 (1), 2009
25392009
A calculus for cryptographic protocols: The spi calculus
M Abadi, AD Gordon
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
21031997
A theory of objects
M Abadi, L Cardelli
Springer, 1996
2025*1996
The existence of refinement mappings
M Abadi, L Lamport
Theoretical Computer Science 82 (2), 253-284, 1991
14951991
Mobile values, new names, and secure communication
M Abadi, C Fournet
ACM Sigplan Notices 36 (3), 104-115, 2001
12402001
Explicit substitutions
M Abadi, L Cardelli, PL Curien, JJ Lévy
Journal of Functional Programming 6 (2), 299-327, 1996
1217*1996
Authentication in distributed systems: Theory and practice
B Lampson, M Abadi, M Burrows, E Wobber
ACM Transactions on Computer Systems (TOCS) 10 (4), 265-310, 1992
11531992
Naiad: a timely dataflow system
DG Murray, F McSherry, R Isaacs, M Isard, P Barham, M Abadi
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
10992013
Semi-supervised knowledge transfer for deep learning from private training data
N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar
arXiv preprint arXiv:1610.05755, 2016
10862016
Prudent engineering practice for cryptographic protocols
M Abadi, R Needham
IEEE transactions on Software Engineering 22 (1), 6-15, 1996
10381996
Adversarial patch
TB Brown, D Mané, A Roy, M Abadi, J Gilmer
arXiv preprint arXiv:1712.09665, 2017
9192017
A calculus for access control in distributed systems
M Abadi, M Burrows, B Lampson, G Plotkin
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (4), 706-734, 1993
8291993
Composing specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 73-132, 1993
8121993
Conjoining specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 17 (3), 507-535, 1995
6631995
A semantics for a logic of authentication
M Abadi, MR Tuttle
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
596*1991
XFI: Software guards for system address spaces
U Erlingsson, M Abadi, M Vrable, M Budiu, GC Necula
Proceedings of the 7th symposium on Operating systems design and …, 2006
5672006
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20