default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Likely matches
- Kevin M. Carter 0001
Massachusetts Institute of Technology - Kevin M. Carter 0002
Microsoft
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 70 matches
- 2024
- Joon-Seok Kim, Gautam Malviya Thakur, Licia Amichi, Annetta Burger, Chathika Gunaratne, Joseph V. Tuccillo, Taylor Hauser, Joseph Bentley, Kevin A. Sparks, Debraj De, Chance Brown, Elizabeth C. McBride, Jesse McGaha, James D. Gaboardi, Xiuling Nie, Steven Carter Christopher:
HumoNet: A Framework for Realistic Modeling and Simulation of Human Mobility Network. MDM 2024: 185-194 - Debraj De, Gautam Malviya Thakur, Jesse McGaha, Chance Brown, Xiuling Nie, Todd Thomas, James D. Gaboardi, Kevin A. Sparks, Annetta Burger, Elizabeth C. McBride, Joon-Seok Kim, Licia Amichi, Chathika Gunaratne, Carter Christopher, Dan Zubko:
DICER: Data Intensive Computing Environment and Runtime for Evaluating Unprecedented Scale of Geospatial-Temporal Human Mobility Data. MDM 2024: 139-148 - 2023
- Andrew D. McNaughton, Rajendra P. Joshi, Carter R. Knutson, Fnu Anubhav, Kevin J. Luebke, Jeremiah P. Malerich, Peter B. Madrid, Neeraj Kumar:
Machine Learning Models for Predicting Molecular UV-Vis Spectra with Quantum Mechanical Properties. J. Chem. Inf. Model. 63(5): 1462-1471 (2023) - Yuwei Mao, Hui Lin, Christina Xuan Yu, Roger Frye, Darren Beckett, Kevin Anderson, Lars Jacquemetton, Fred Carter, Zhangyuan Gao, Wei-keng Liao, Alok N. Choudhary, Kornel F. Ehmann, Ankit Agrawal:
A deep learning framework for layer-wise porosity prediction in metal powder bed fusion using thermal signatures. J. Intell. Manuf. 34(1): 315-329 (2023) - 2022
- Taylor J. Bell, Eva-Maria Ahrer, Jonathan Brande, Aarynn L. Carter, Adina D. Feinstein, Giannina Guzman Caloca, Megan Mansfield, Sebastian Zieba, Caroline Piaulet, Björn Benneke, Joseph Filippazzo, Erin M. May, Pierre-Alexis Roy, Laura Kreidberg, Kevin B. Stevenson:
Eureka!: An End-to-End Pipeline for JWST Time-Series Observations. J. Open Source Softw. 7(79): 4503 (2022) - 2020
- Vishesh Kumar, Gayithri Jayathirtha, Erica Halverson, Laura Carter-Stone, Kevin Leander, Mike Tissenbaum, Nathan Wheeler, Breanne K. Litts:
Becoming Together: Creating and Looking at Collaborations as Learning Products. ICLS 2020 - Kevin Byrne, Skye Conlan, Magdalena Bazalova-Carter, Mark Foley:
Optimizing Novel Inorganic Scintillation Detectors for Applications in Medical Physics. IEEE SENSORS 2020: 1-4 - Dave Carter, Marta Stojanovic, Philip Hachey, Kevin Fournier, Simon Rodier, Yunli Wang, Berry de Bruijn:
Global Public Health Surveillance Using Media Reports: Redesigning GPHIN. MIE 2020: 843-847 - Kevin Roitero, Ben Carterette, Rishabh Mehrotra, Mounia Lalmas:
Leveraging Behavioral Heterogeneity Across Markets for Cross-Market Training of Recommender Systems. WWW (Companion Volume) 2020: 694-702 - Dave Carter, Marta Stojanovic, Philip Hachey, Kevin Fournier, Simon Rodier, Yunli Wang, Berry de Bruijn:
Global Public Health Surveillance using Media Reports: Redesigning GPHIN. CoRR abs/2004.04596 (2020) - 2019
- Daniel-Adriano Silva, Shawn Yu, Umut Y. Ulge, Jamie B. Spangler, Kevin M. Jude, Carlos Labão-Almeida, Lestat R. Ali, Alfredo Quijano-Rubio, Mikel Ruterbusch, Isabel Leung, Tamara Biary, Stephanie J. Crowley, Enrique Marcos, Carl D. Walkey, Brian D. Weitzner, Fátima Pardo Avila, Javier Castellanos, Lauren P. Carter, Lance J. Stewart, Stanley R. Riddell, Marion Pepper, Gonçalo J. L. Bernardes, Michael Dougan, K. Christopher Garcia, David Baker:
De novo design of potent and selective mimics of IL-2 and IL-15. Nat. 565(7738): 186-191 (2019) - Luis D. Rojas, Kevin Hess, Christina Carter-Brown:
Effectively Using Machine Learning to Expedite System Level Test Failure Debug. ITC 2019: 1-6 - Carleton Coffrin, James Arnold, Stephan J. Eidenbenz, Derek Aberle, John Ambrosiano, Zachary K. Baker, Sara Brambilla, Michael J. Brown, K. Nolan Carter, Pinghan Chu, Patrick Conry, Keeley Costigan, Ariane Eberhardt, David M. Fobes, Adam Gausmann, Sean N. Harris, Donovan Heimer, Marlin Holmes, Bill Junor, Csaba Kiss, Steve Linger, Rodman R. Linn, Li-Ta Lo, Jonathan MacCarthy, Omar Marcillo, Clay McGinnis, Alexander McQuarters, Eric Michalak, Arvind Mohan, Matt Nelson, Diane Oyen, Nidhi Parikh, Donatella Pasqualini, Aaron S. Pope, Reid B. Porter, Chris Rawlings, Hannah Reinbolt, Reid D. Rivenburgh, Philip Romero, Kevin Schoonover, Alexei N. Skurikhin, Daniel R. Tauritz, Dima Tretiak, Zhehui Wang, James Wernicke, Brad Wolfe, Phillip Wolfram, Jonathan Woodring:
The ISTI Rapid Response on Exploring Cloud Computing 2018. CoRR abs/1901.01331 (2019) - 2018
- Bruno Bouchard, Kevin Bouchard, Noam Brown, Niyati Chhaya, Eitan Farchi, Sébastien Gaboury, Christopher W. Geib, Amelie Gyrard, Kokil Jaidka, Sarah Keren, Roni Khardon, Parisa Kordjamshidi, David R. Martinez, Nicholas Mattei, Martin Michalowski, Reuth Mirsky, Joseph C. Osborn, Cem Sahin, Onn Shehory, Arash Shaban-Nejad, Amit P. Sheth, Ilan Shimshoni, Howard E. Shrobe, Arunesh Sinha, Atanu R. Sinha, Biplav Srivastava, William W. Streilein, Georgios Theocharous, Kristen Brent Venable, Neal Wagner, Anna Zamansky:
Reports of the Workshops of the 32nd AAAI Conference on Artificial Intelligence. AI Mag. 39(4): 45-56 (2018) - 2017
- Kevin H. Knuth, Ben Placek, Daniel Angerhausen, Jennifer L. Carter, Bryan D'Angelo, Anthony D. Gai, Bertrand Carado:
EXONEST: The Bayesian Exoplanetary Explorer. Entropy 19(10): 559 (2017) - Richard P. Lippman, David J. Weller-Fahy, Alyssa C. Mensch, William M. Campbell, Joseph P. Campbell, William W. Streilein, Kevin M. Carter:
Toward Finding Malicious Cyber Discussions in Social Media. AAAI Workshops 2017 - 2016
- Stefano V. Albrecht, Bruno Bouchard, John S. Brownstein, David L. Buckeridge, Cornelia Caragea, Kevin M. Carter, Adnan Darwiche, Blaz Fortuna, Yannick Francillette, Sébastien Gaboury, C. Lee Giles, Marko Grobelnik, Estevam R. Hruschka Jr., Jeffrey O. Kephart, Parisa Kordjamshidi, Viliam Lisý, Daniele Magazzeni, João Marques-Silva, Pierre Marquis, David R. Martinez, Marek P. Michalowski, Arash Shaban-Nejad, Zeinab Noorian, Enrico Pontelli, Alex Rogers, Stephanie Rosenthal, Dan Roth, Arunesh Sinha, William W. Streilein, Sylvie Thiébaux, Tran Cao Son, Byron C. Wallace, Toby Walsh, Michael Witbrock, Jie Zhang:
Reports of the 2016 AAAI Workshop Program. AI Mag. 37(3): 99-108 (2016) - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Secure outsourced garbled circuit evaluation for mobile devices. J. Comput. Secur. 24(2): 137-180 (2016) - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing secure two-party computation as a black box. Secur. Commun. Networks 9(14): 2261-2275 (2016) - Siddhant Deshmukh, Henry Carter, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler:
Efficient and secure template blinding for biometric authentication. CNS 2016: 480-488 - Michael L. Winterrose, Kevin M. Carter, Neal Wagner, William W. Streilein:
Balancing Security and Performance for Agility in Dynamic Threat Environments. DSN 2016: 607-617 - Carter Yagemann, Wenliang Du:
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook. ESORICS (1) 2016: 383-400 - Benjamin Mood, Debayan Gupta, Henry Carter, Kevin R. B. Butler, Patrick Traynor:
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation. EuroS&P 2016: 112-127 - Nolen Scaife, Henry Carter, Patrick Traynor, Kevin R. B. Butler:
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. ICDCS 2016: 303-312 - David R. Martinez, William W. Streilein, Kevin M. Carter, Arunesh Sinha:
Artificial Intelligence for Cyber Security, Papers from the 2016 AAAI Workshop, Phoenix, Arizona, USA, February 12, 2016. AAAI Technical Report WS-16-03, AAAI Press 2016 [contents] - 2015
- Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing Secure Two-Party Computation as a Black Box. CANS 2015: 214-222 - Ethan Shernan, Henry Carter, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. DIMVA 2015: 239-260 - Ben W. Priest, Era Vuksani, Neal Wagner, Brady Tello, Kevin M. Carter, William W. Streilein:
Agent-based simulation in support of moving target cyber defense technology development and evaluation. SpringSim (CNS) 2015: 16-23 - 2014
- Kevin M. Carter, Nwokedi C. Idika, William W. Streilein:
Probabilistic Threat Propagation for Network Security. IEEE Trans. Inf. Forensics Secur. 9(9): 1394-1405 (2014) - Kevin M. Carter, James Riordan, Hamed Okhravi:
A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses. MTD@CCS 2014: 21-30
skipping 40 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-13 18:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint