Search

Your search keyword '"Alomair, Basel"' showing total 174 results

Search Constraints

Start Over You searched for: Author "Alomair, Basel" Remove constraint Author: "Alomair, Basel"
174 results on '"Alomair, Basel"'

Search Results

1. Vulnerability Detection with Code Language Models: How Far Are We?

2. Jatmo: Prompt Injection Defense by Task-Specific Finetuning

3. Can LLMs Follow Simple Rules?

4. Jatmo: Prompt Injection Defense by Task-Specific Finetuning

5. On the Structure and Computation of Random Walk Times in Finite Graphs

6. Combinatorial Algorithms for Control of Biological Regulatory Networks

7. Submodularity in Input Node Selection for Networked Systems

8. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

9. Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach

10. Input Selection for Performance and Controllability of Structured Linear Descriptor Systems

11. Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework

12. Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach

13. Joint Performance and Controllability of Networked Systems

14. Input Selection for Robustness to Noise

15. Resilience to Link Noise Injection Attacks

16. Background on Control of Networked Systems

17. Selecting Catalyst Nodes for Synchronization

18. Submodular Optimization for Smooth Convergence

19. Emerging Topics: Submodularity in Energy Systems

20. Submodular Functions and Matroids

21. Distributed Submodular Maximization

22. Centralized Submodular Optimization

23. Secure Error-Tolerant Graph Matching Protocols

24. Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games

25. Universal Hash-Function Families: From Hashing to Authentication

26. Authenticated Encryption: How Reordering Can Impact Performance

27. -MACs: Towards More Secure and More Efficient Constructions of Secure Channels

28. Efficient Authentication for Mobile and Pervasive Computing

29. Efficient Generic Forward-Secure Signatures and Proxy Signatures

30. Passive Attacks on a Class of Authentication Protocols for RFID

43. The power of primes: security of authentication based on a universal hash-function family

Catalog

Books, media, physical & digital resources