Publications

Found 266 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Maresca, M., & Li H. (1991).  Hierarchical Node Clustering in Polymorphic Processor Arrays.
Maresca, M., & Li H. (1991).  Virtual Parallelism Support in Reconfigurable Processor Arrays.
Maresca, M. (2016).  The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing. Computer. 49(9), 78-85.
Maresca, M. (1991).  Polymorphic Processor Arrays.
Marczak, B., Guarnieri C., Marquis-Boire M., Scott-Railton J., & McKune S. (2014).  Hacking Team's US Nexus. The Citizen Lab.
Marczak, B., Scott-Railton J., & McKune S. (2015).  Hacking Team Reloaded? US - Based Ethiopian Journalists Again Targeted with Spyware. The Citizen Lab.
Marczak, B., Scott-Railton J., Marquis-Boire M., & Paxson V. (2014).  When Governments Hack Opponents: A Look at Actors and Technology.
Marczak, B. (2016).  Defending Dissidents from Targeted Digital Surveillance.
Marczak, B., Weaver N., Dalek J., Fifield D., McKune S., Rey A., et al. (2015).  China’s Great Cannon. The Citizen Report.
Marczak, B., Guarnieri C., Marquis-Boire M., & Scott-Railton J. (2014).  Hacking Team and the Targeting of Ethiopian Journalists. The Citizen Lab.
Marczak, B., Scott-Railton J., Senft A., Poetranto I., & McKune S. (2015).  Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation. The Citizen Lab.
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Marczak, B., Guarnieri C., Marquis-Boire M., & Scott-Railton J. (2014).  Mapping Hacking Team's "Untraceable" Spyware. The Citizen Lab.
Marczak, B., & Scott-Railton J. (2016).  Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents. The Citizen Lab.
Marczak, B., & Paxson V. (2017).  Social Engineering Attacks on Government Opponents: Target Perspectives. Proceedings on Privacy Enhancing Technologies. 2, 152-164.
Marchini, J., Cutler D., Patterson N., Stephens M., Eskin E., Halperin E., et al. (2006).  A Comparison of Phasing Algorithms for Trios and Unrelated Individuals. American Journal of Human Genetics. 78(3), 437-450.
Marchetti-Spaccamela, A., Nanni U., & Rohnert H. (1992).  On-Line Graph Algorithms for Incremental Compilation.
Mao, Z. Morley, Govindan R., Varghese G., & Katz R. H. (2002).  Route Flap Dampening Exacerbates Internet Routing Convergence. Proceedings of the ACM SIGCOMM 2002.
Manzoni, P. (1994).  Introducing Resources Management in IP-Based Nodes.
Mankin, A.., Romanow A., Bradner S.., & Paxson V. (1998).  IETF Criteria for Evaluating Reliable Multicast Transport and Application Protocols.
Mani, D.. R., & Shastri L. (1993).  Reflexive Reasoning with Multiple-Instantiation in in a Connectionist Reasoning System with a Typed Hierarchy. 5, 205-242.
Mani, D.. R., & Shastri L. (1999).  Parallel inference with very large knowledge bases. 2,
Mani, D.. R., & Shastri L. (1994).  Massively Parallel Real-Time Reasoning with Very Large Knowledge Bases: An Interim Report.
Mańdziuk, J. (1997).  Optimization with the Hopfield network based on correlated noises: an empirical approach.
Mańdziuk, J., & Shastri L. (1998).  Incremental Class Learning Approach and Its Application to Handwritten Digit Recognition.

Pages