BibTeX records: Tom Dean

download as .bib file

@article{DBLP:journals/corr/GhoshVSRDH16,
  author       = {Shalini Ghosh and
                  Oriol Vinyals and
                  Brian Strope and
                  Scott Roy and
                  Tom Dean and
                  Larry P. Heck},
  title        = {Contextual {LSTM} {(CLSTM)} models for Large scale {NLP} tasks},
  journal      = {CoRR},
  volume       = {abs/1602.06291},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.06291},
  eprinttype    = {arXiv},
  eprint       = {1602.06291},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GhoshVSRDH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/ChapmanKD14,
  author       = {Chris Chapman and
                  Scott Knight and
                  Tom Dean},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  G{\"{u}}rkan G{\"{u}}r},
  title        = {USBcat - Towards an Intrusion Surveillance Toolset},
  booktitle    = {Proceedings 2014 International Workshop on Advanced Intrusion Detection
                  and Prevention, {AIDP} 2014, Marrakesh, Morocco, June 2014},
  series       = {{EPTCS}},
  volume       = {165},
  pages        = {31--43},
  year         = {2014},
  url          = {https://doi.org/10.4204/EPTCS.165.3},
  doi          = {10.4204/EPTCS.165.3},
  timestamp    = {Wed, 12 Sep 2018 01:05:13 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChapmanKD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/DeanHKV06,
  author       = {Tom Dean and
                  Mark Harman and
                  Rainer Koschke and
                  Michael L. Van de Vanter},
  title        = {Selected papers from the fourth Source Code Analysis and Manipulation
                  {(SCAM} 2004) Workshop},
  journal      = {J. Syst. Softw.},
  volume       = {79},
  number       = {9},
  pages        = {1217--1218},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.jss.2006.02.039},
  doi          = {10.1016/J.JSS.2006.02.039},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/DeanHKV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/TalKD04,
  author       = {Oded Tal and
                  Scott Knight and
                  Tom Dean},
  title        = {Syntax-based Vulnerability Testing of Frame-based Network Protocols},
  booktitle    = {Second Annual Conference on Privacy, Security and Trust, October 13-15,
                  2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick,
                  Canada, Proceedings},
  pages        = {155--160},
  year         = {2004},
  url          = {http://dev.hil.unb.ca/Texts/PST/pdf/tal.pdf},
  timestamp    = {Tue, 07 Mar 2006 13:49:03 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/TalKD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}