Search

Your search keyword '"Alomair, Basel"' showing total 161 results

Search Constraints

Start Over You searched for: Author "Alomair, Basel" Remove constraint Author: "Alomair, Basel"
161 results on '"Alomair, Basel"'

Search Results

1. Vulnerability Detection with Code Language Models: How Far Are We?

2. Jatmo: Prompt Injection Defense by Task-Specific Finetuning

3. Can LLMs Follow Simple Rules?

4. On the Structure and Computation of Random Walk Times in Finite Graphs

5. Combinatorial Algorithms for Control of Biological Regulatory Networks

6. Submodularity in Input Node Selection for Networked Systems

7. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

8. Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach

9. Input Selection for Performance and Controllability of Structured Linear Descriptor Systems

10. Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework

11. Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach

12. Joint Performance and Controllability of Networked Systems

13. Input Selection for Robustness to Noise

14. Resilience to Link Noise Injection Attacks

15. Background on Control of Networked Systems

16. Selecting Catalyst Nodes for Synchronization

17. Submodular Optimization for Smooth Convergence

18. Emerging Topics: Submodularity in Energy Systems

19. Submodular Functions and Matroids

20. Distributed Submodular Maximization

21. Centralized Submodular Optimization

22. Secure Error-Tolerant Graph Matching Protocols

23. Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games

24. Universal Hash-Function Families: From Hashing to Authentication

25. Authenticated Encryption: How Reordering Can Impact Performance

26. -MACs: Towards More Secure and More Efficient Constructions of Secure Channels

27. Efficient Authentication for Mobile and Pervasive Computing

28. Efficient Generic Forward-Secure Signatures and Proxy Signatures

29. Passive Attacks on a Class of Authentication Protocols for RFID

42. The power of primes: security of authentication based on a universal hash-function family

Catalog

Books, media, physical & digital resources