Ullman, Jeffrey
320  Ergebnisse:
Personensuche X
?
1

Turbidity removal through the application of powdered azadi..:

Khokhar, Waheed Ali ; Ullman, Jeffrey L. ; Imran, Uzma.
Mehran University Research Journal of Engineering and Technology.  42 (2023)  1 - p. 1 , 2023
 
?
2

Abstractions, their algorithms, and their compilers:

Aho, Alfred ; Ullman, Jeffrey
Communications of the ACM.  65 (2022)  2 - p. 76-91 , 2022
 
?
 
?
4

Visits to Research Groups:

Ullman, Jeffrey D.
XRDS: Crossroads, The ACM Magazine for Students.  29 (2022)  2 - p. 10-11 , 2022
 
?
5

BFLUT Bloom Filter for Private Look Up Tables:

, In: Cyber Security, Cryptology, and Machine Learning; Lecture Notes in Computer Science,
Dolev, Shlomi ; Gudes, Ehud ; Segev, Erez.. - p. 499-505 , 2022
 
?
6

Abstractions, their algorithms, and their compilers:

Aho, Alfred ; Ullman, Jeffrey
Communications of the ACM.  65 (2022)  2 - p. 76-91 , 2022
 
?
7

On the Nature of Data Science:

, In: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining,
Ullman, Jeffrey - p. 4 ff. , 2021
 
?
9

Meta-X: A Technique for Reducing Communication in Geographi..:

, In: Lecture Notes in Computer Science; Cyber Security Cryptography and Machine Learning,
Afrati, Foto ; Dolev, Shlomi ; Sharma, Shantanu. - p. 467-486 , 2021
 
?
11

Efficient Multiway Hash Join on Reconfigurable Hardware:

, In: Performance Evaluation and Benchmarking for the Era of Cloud(s); Lecture Notes in Computer Science,
 
?
12

PANDA: Partitioned Data Security on Outsourced Sensitive an..:

Mehrotra, Sharad ; Sharma, Shantanu ; Ullman, Jeffrey D....
ACM Transactions on Management Information Systems.  11 (2020)  4 - p. 1-41 , 2020
 
?
13

PANDA : Partitioned Data Security on Outsourced Sensitiv..:

Mehrotra, Sharad ; Sharma, Shantanu ; Ullman, Jeffrey D....
ACM Transactions on Management Information Systems (TMIS).  11 (2020)  4 - p. 1-41 , 2020
 
?
14

Scaling Cryptographic Techniques by Exploiting Data Sensiti..:

, In: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy,
 
1-15