The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for bypassing with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1964-1995 (17) 1996-1999 (22) 2000-2002 (32) 2003-2004 (33) 2005 (15) 2006 (27) 2007 (33) 2008 (32) 2009 (30) 2010 (16) 2011-2012 (28) 2013-2014 (33) 2015 (27) 2016 (28) 2017 (29) 2018 (26) 2019 (20) 2020 (23) 2021 (28) 2022 (29) 2023 (40) 2024 (9)
Publication types (Num. hits)
article(194) inproceedings(380) phdthesis(2) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 218 occurrences of 206 keywords

Results
Found 577 publication records. Showing 577 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
101Vladimír Guzma, Pekka Jääskeläinen, Pertti Kellomäki, Jarmo Takala Impact of Software Bypassing on Instruction Level Parallelism and Register File Traffic. Search on Bibsonomy SAMOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
91Chua-Chin Wang, Gang-Neng Sung Low-Power Multiplier Design Using a Bypassing Technique. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Low power multiplier, Timing control, Partial product, Bypassing
89Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, Alexandru Nicolau Operation tables for scheduling in the presence of incomplete bypassing. Search on Bibsonomy CODES+ISSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF hazard detection, operation table, reservation table, scheduling, retargetable compilers, bypass
79Ömer Erdem Demir, Premkumar T. Devanbu, Eric Wohlstadter, Stefan Tai An aspect-oriented approach to bypassing middleware layers. Search on Bibsonomy AOSD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF aspect oriented bypassing, middleware, cross-layer, model-driven
71Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, Alexandru Nicolau Retargetable pipeline hazard detection for partially bypassed processors. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
67Teresa L. Johnson, Daniel A. Connors, Matthew C. Merten, Wen-mei W. Hwu Run-Time Cache Bypassing. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1999 DBLP  DOI  BibTeX  RDF cache bypassing, Data cache, cache management, temporal locality, spatial locality
67Arthur Abnous, Nader Bagherzadeh Pipelining and Bypassing in a VLIW Processor. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF VLIWprocessor, very long instruction word, pipeline data hazards, performance evaluation, performance, parallel architectures, computer architecture, pipeline processing, pipeline structure, bypassing
65Chua-Chin Wang, Gang-Neng Sung A Low-Power 2-Dimensional Bypassing Multiplier Using 0.35 um CMOS Technology. Search on Bibsonomy ISVLSI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
65Yin-Tsung Hwang, Jin-Fa Lin, Ming-Hwa Sheu, Chia-Jen Sheu Low Power Multiplier Designs Based on Improved Column Bypassing Schemes. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
65Aviral Shrivastava, Nikil D. Dutt, Alexandru Nicolau, Eugene Earlie PBExplore: A Framework for Compiler-in-the-Loop Exploration of Partial Bypassing in Embedded Processors. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
65Youfeng Wu, Ryan N. Rakvic, Li-Ling Chen, Chyi-Chang Miao, George Chrysos, Jesse Fang Compiler managed micro-cache bypassing for high performance EPIC processors. Search on Bibsonomy MICRO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
55Mazen Kharbutli, Yan Solihin Counter-Based Cache Replacement and Bypassing Algorithms. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cache Bypassing, Counter-Based Algorithms, Cache memories, Cache Replacement, Cache Misses
55Daniel Ortega, Mateo Valero, Eduard Ayguadé Dynamic Memory Instruction Bypassing. Search on Bibsonomy Int. J. Parallel Program. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF memory bypassing, Prefetching
53Pieter Bellens, Josep M. Pérez, Rosa M. Badia, Jesús Labarta Exploiting Locality on the Cell/B.E. through Bypassing. Search on Bibsonomy SAMOS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
53Yin-Tsung Hwang, Jin-Fa Lin, Ming-Hwa Sheu, Chia-Jen Sheu Low Power Multipliers Using Enhenced Row Bypassing Schemes. Search on Bibsonomy SiPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Ehsan Atoofian, Amirali Baniasadi Improving Energy-Efficiency by Bypassing Trivial Computations. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Daniel Ortega, Eduard Ayguadé, Jean-Loup Baer, Mateo Valero Cost-Effective Compiler Directed Memory Prefetching and Bypassing. Search on Bibsonomy IEEE PACT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
49Lei Shu 0001, ZhangBing Zhou, Manfred Hauswirth, Danh Le Phuoc, Peng Yu, Lin Zhang 0012 Transmitting streaming data in wireless multimedia sensor networks with holes. Search on Bibsonomy MUM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TPGF routing algorithm, hole-bypassing routing, multi-path transmission, multimedia sensor networks, streaming data
48Aviral Shrivastava, Sanghyun Park, Eugene Earlie, Nikil D. Dutt, Alexandru Nicolau, Yunheung Paek Automatic Design Space Exploration of Register Bypasses in Embedded Processors. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Avinash Karanth Kodi, Ahmed Louri, Janet Meiling Wang Design of energy-efficient channel buffers with router bypassing for network-on-chips (NoCs). Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Taekkyeun Lee, Chunming Qiao, Murat Demirbas, Jinhui Xu 0001 ABC: A Simple Geographic Forwarding Scheme Capable of Bypassing Routing Holes in Sensor Networks. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Gang-Neng Sung, Yan-Jhin Ciou, Chua-Chin Wang A power-aware 2-dimensional bypassing multiplier using cell-based design flow. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Jonathan Engelsma, James C. Ferrans Bypassing Bluetooth Device Discovery Using a Multimodal User Interface. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Jun-ni Ohban, Vasily G. Moshnyaga, Koji Inoue Multiplier energy reduction through bypassing of partial products. Search on Bibsonomy APCCAS (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Nobuo Tsuda, Tatsuyuki Shimizu Reconfigurable Mesh-Connected Processor Arrays Using Row-Column Bypassing and Direct Replacement. Search on Bibsonomy ISPAN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
37Roger Espasa, Mateo Valero Decoupled Vector Architectures. Search on Bibsonomy HPCA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF decoupled vector architectures, trace driven approach, Perfect Club programs, realistic memory latencies, bypassing technique, total memory traffic, performance advantages, performance evaluation, performance, vector processor, vector processor systems, hardware cost
36Hui Zeng, Kanad Ghose Register file caching for energy efficiency. Search on Bibsonomy ISLPED The full citation details ... 2006 DBLP  DOI  BibTeX  RDF register caching, energy-efficiency, register files
36Andreas Moshovos, Gurindar S. Sohi Reducing Memory Latency via Read-after-Read Memory Dependence Prediction. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF memory dependence prediction, cache, dynamic optimization, load
36Andreas Moshovos, Gurindar S. Sohi Read-After-Read Memory Dependence Prediction. Search on Bibsonomy MICRO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
30Sherri Sparks, Shawn Embleton, Cliff Changchun Zou A chipset level network backdoor: bypassing host-based firewall & IDS. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network backdoor, rootkit, hardware security
30Haakon Dybdahl, Per Stenström Enhancing Last-Level Cache Performance by Block Bypassing and Early Miss Determination. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Ko-Chi Kuo, Chi-Wen Chou Low Power Multiplier with Bypassing and Tree Strucuture. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Mingchen Wen, Sying-Jyan Wang, Yen-Nan Lin Low power parallel multiplier with column bypassing. Search on Bibsonomy ISCAS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Kunal Talwar Bypassing the embedding: algorithms for low dimensional metrics. Search on Bibsonomy STOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TSP, PTAS, routing schemes, doubling metrics, distance labels
30Daniel Ortega, Eduard Ayguadé, Mateo Valero Dynamic memory instruction bypassing. Search on Bibsonomy ICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF on-chip memory management, superscalar processors
25Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh Scalable network-based buffer overflow attack detection. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks
25Chung-Ho Chen, Arun K. Somani Architecture Technique Trade-Offs Using Mean Memory Delay Time. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Bus width, cache hit ratio, memory cycle time, pipelined memory, read-bypassing write buffer, performance trade-off
24Lingxiang Xiang, Tianzhou Chen, Qingsong Shi, Wei Hu 0001 Less reused filter: improving l2 cache performance via filtering less reused lines. Search on Bibsonomy ICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cache filtering, less reused line
24Lionel Lapierre, René Zapata, Pascal Lépinay Simulatneous Path Following and Obstacle Avoidance Control of a Unicycle-type Robot. Search on Bibsonomy ICRA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Tingting Sha, Milo M. K. Martin, Amir Roth NoSQ: Store-Load Communication without a Store Queue. Search on Bibsonomy MICRO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Gregory B. Newby Paths to creativity in security careers. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Alimujiang Yiming, Toshio Eisaka Support Industrial Hard Real-Time Traffic with Switched Ethernet. Search on Bibsonomy ICESS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Vlad Petric, Tingting Sha, Amir Roth RENO - A Rename-Based Instruction Optimizer. Search on Bibsonomy ISCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Mike Clark, Lizy Kurian John Performance Evaluation of Configurable Hardware Features on the AMD-K5. Search on Bibsonomy ICCD The full citation details ... 1999 DBLP  DOI  BibTeX  RDF AMD-K5, performance evaluation, benchmarking, performance measurement, hardware reconfigurability
18Tatyana Chernonog Supply chains of mobile apps: competition, private labels and bypassing when the app's quality is co-created. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Zheng Zhang, Jingfeng Xue, Tianshi Mu, Ting Yu, Kefan Qiu, Tian Chen, Yuanzhang Li Bypassing software-based remote attestation using debug registers. Search on Bibsonomy Connect. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Qilong Wu 0002, Varun Chandrasekaran Bypassing LLM Watermarks with Color-Aware Substitutions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Mohammadreza Amini, Ghazal Asemian, Michel Kulhandjian, Burak Kantarci, Claude D'Amours, Melike Erol-Kantarci Bypassing a Reactive Jammer via NOMA-Based Transmissions in Critical Missions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Freddy Heppell, Mehmet E. Bakir, Kalina Bontcheva Lying Blindly: Bypassing ChatGPT's Safeguards to Generate Hard-to-Detect Disinformation Claims at Scale. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Congpei An, Hao-Ning Wu Bypassing the quadrature exactness assumption of hyperinterpolation on the sphere. Search on Bibsonomy J. Complex. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Jiseok Bang, Jeong Nyeo Kim, Seungkwang Lee Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Jisu Park, DaYeon Yoo, Nara Yun, Jihoon Lee, DaeYoub Kim A Thread Chaining Attack for Bypassing a DLL Injection Monitoring System*. Search on Bibsonomy ICCE The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Thayne T. Walker, Nathan R. Sturtevant, Ariel Felner Clique Analysis and Bypassing in Continuous-Time Conflict-Based Search. Search on Bibsonomy AAMAS The full citation details ... 2024 DBLP  BibTeX  RDF
18Jordan Cahill, Ashkan Parsi, Darragh Mullins, Jonathan Horgan, Enda Ward, Ciarán Eising, Patrick Denny, Brian M. Deegan, Martin Glavin, Edward Jones Exploring the Viability of Bypassing the Image Signal Processor for CNN-Based Object Detection in Autonomous Vehicles. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Cong Thuan Do, Cheol Hong Kim, Sung Woo Chung Correction to: Aggressive GPU cache bypassing with monolithic 3D-based NoC. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Cong Thuan Do, Cheol Hong Kim, Sung Woo Chung Aggressive GPU cache bypassing with monolithic 3D-based NoC. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Ryuichi Ueda, Leon Tonouchi, Tatsuhiro Ikebe, Yasuo Hayashibara Implementation of Brute-Force Value Iteration for Mobile Robot Path Planning and Obstacle Bypassing. Search on Bibsonomy J. Robotics Mechatronics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18David H. Oaknin Bypassing the Kochen-Specker Theorem: An Explicit Non-Contextual Statistical Model for the Qutrit. Search on Bibsonomy Axioms The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Anoushiravan Zahedi, Sergio Oroz Artigas, Nora Swaboda, Corinde E. Wiers, Kai Görgen, Soyoung Q. Park Neural correlates of changing food choices while bypassing values. Search on Bibsonomy NeuroImage The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Alexander Rothkopf, Jan Nordström A new variational discretization technique for initial value problems bypassing governing equations. Search on Bibsonomy J. Comput. Phys. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Luke Bhan, Yuanyuan Shi, Miroslav Krstic Neural Operators for Bypassing Gain and Control Computations in PDE Backstepping. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Davide Bilò, Shiri Chechik, Keerti Choudhary, Sarel Cohen, Tobias Friedrich 0001, Martin Schirneck Improved Approximate Distance Oracles: Bypassing the Thorup-Zwick Bound in Dense Graphs. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Fabian David Schmidt, Ivan Vulic, Goran Glavas One For All & All For One: Bypassing Hyperparameter Tuning with Model Averaging For Cross-Lingual Transfer. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Jason Vega, Isha Chaudhary, Changming Xu, Gagandeep Singh Bypassing the Safety Training of Open-Source LLMs with Priming Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas Bypassing antivirus detection: old-school malware, new tricks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng 0007, Qinglong Wang, Zhan Qin, Zhibo Wang 0001, Kui Ren 0001 SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Haolin Liu, Chen-Yu Wei, Julian Zimmert Bypassing the Simulator: Near-Optimal Adversarial Linear Contextual Bandits. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Thayne T. Walker, Nathan R. Sturtevant, Ariel Felner Clique Analysis and Bypassing in Continuous-Time Conflict-Based Search. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Che Liu, Anand Shah, Wenjia Bai, Rossella Arcucci Utilizing Synthetic Data for Medical Vision-Language Pre-training: Bypassing the Need for Real Images. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mohammed M. Alani, Atefeh Mashatan, Ali Miri Adversarial Explainability: Utilizing Explainable Machine Learning in Bypassing IoT Botnet Detection Systems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Xiangtao Meng, Li Wang, Shanqing Guo, Lei Ju 0001, Qingchuan Zhao AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Enrique Soriano-Salvador, Gorka Guardiola Muzquiz Detecting and bypassing frida dynamic function call tracing: exploitation and mitigation. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Vincent Giraud, David Naccache Bypassing Android isolation with fuel gauges: new risks with advanced power ICs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
18SeonJin Hwang, Assem Utaliyeva, Jae-Seok Kim, Yoon-Ho Choi Bypassing Heaven's Gate Technique Using Black-Box Testing. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mathew Nicho, Ibrahim Sabry Bypassing Multiple Security Layers Using Malicious USB Human Interface Device. Search on Bibsonomy ICISSP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Benjamin David Evans, Johannes Betz, Hongrui Zheng, Herman A. Engelbrecht, Rahul Mangharam, Hendrik W. Jordaan Bypassing the Simulation-to-Reality Gap: Online Reinforcement Learning Using a Supervisor. Search on Bibsonomy ICAR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Hélène Kabbech, Jente van Staalduinen, Frank Grosveld, Ihor Smal Accurate Estimation of Particle Dynamics Bypassing Substrate Drift Bias: Application to Cell Nucleus Motion. Search on Bibsonomy ISBI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Sachin Bagga, Ruchika Gupta, John Jose PortBlocker: Detection and Mitigation of Hardware Trojan through Re-routing and Bypassing. Search on Bibsonomy MCSoC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Efstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas Bypassing antivirus detection: old-school malware, new tricks. Search on Bibsonomy ARES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Shimon Kogan, Merav Parter Towards Bypassing Lower Bounds for Graph Shortcuts. Search on Bibsonomy ESA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Prashanth Amireddy, Ankit Garg, Neeraj Kayal, Chandan Saha 0001, Bhargav Thankey Low-Depth Arithmetic Circuit Lower Bounds: Bypassing Set-Multilinearization. Search on Bibsonomy ICALP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Malith Gallage, Rafaela Scaciota, Sumudu Samarakoon, Mehdi Bennis A Simplified Intelligent Autonomous Obstacle Bypassing Method for Mobile Robots. Search on Bibsonomy MobiCom The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
18Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
18Xing Li, Xiaochong Jiang, Ye Yang, Lilong Chen, Tianyu Xu, Chao Xu, Longbiao Xiao, Fengmin Shi, Yi Wang, Taotao Wu, Yilong Lv, Hangfeng Gao, Zikang Chen, Yisong Qiao, Hongwei Ding, Yijian Dong, Chengkun Wei, Zihui Zhang, Shunmin Zhu, Wenzhi Chen Poster: Triton: Accelerating vSwitch with Flexibility through Hardware Assisting not Bypassing Software. Search on Bibsonomy SIGCOMM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Wenju He, Yilong Guo, Xinmin Tian, Hideki Saito 0001, Wenwan Xing, Feng Zou, Chunyang Dai, Maosu Zhao, Haonan Yang Streamline Ahead-of-Time SYCL CPU Device Implementation through Bypassing SPIR-V. Search on Bibsonomy IWOCL The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Fabian David Schmidt, Ivan Vulic, Goran Glavas One For All & All For One: Bypassing Hyperparameter Tuning with Model Averaging for Cross-Lingual Transfer. Search on Bibsonomy EMNLP (Findings) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Haolin Liu, Chen-Yu Wei, Julian Zimmert Bypassing the Simulator: Near-Optimal Adversarial Linear Contextual Bandits. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
18Yizi Zhang, Tianxiao He, Julien Boussard, Charles Windolf, Olivier Winter, Eric Trautmann, Noam Roth, Hailey Barrell, Mark Churchland, Nicholas A Steinmetz, Erdem Varol, Cole L. Hurwitz, Liam Paninski Bypassing spike sorting: Density-based decoding using spike localization from dense multielectrode probes. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
18Xu Lin 0003, Frederico Araujo, Teryl Taylor, Jiyong Jang, Jason Polakis Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Jianhao Xu, Luca Di Bartolomeo, Flavio Toffalini, Bing Mao, Mathias Payer WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Jialai Wang, Wenjie Qu 0001, Yi Rong, Han Qiu 0001, Qi Li 0002, Zongpeng Li, Chao Zhang 0008 MPass: Bypassing Learning-based Static Malware Detectors. Search on Bibsonomy DAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Maryam Motallebighomi, Harshad Sathaye, Mridula Singh, Aanjhan Ranganathan Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication. Search on Bibsonomy WISEC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Mojtaba Hemmati, Mohammad Ali Hadavi Bypassing Web Application Firewalls Using Deep Reinforcement Learning. Search on Bibsonomy ISC Int. J. Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Nachaat Mohamed Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework. Search on Bibsonomy F1000Research The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Zeyu Mi, Haoqi Zhuang, Binyu Zang, Haibo Chen 0001 General and Fast Inter-Process Communication via Bypassing Privileged Software. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Doowon Lee, Valeria Bertacco Bypassing Multicore Memory Bugs With Coarse-Grained Reconfigurable Logic. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Hafiza Sadia Nawaz, Zhensheng Shi, Yanhai Gan, Amanuel Hirpa, Junyu Dong, Haiyong Zheng Temporal Moment Localization via Natural Language by Utilizing Video Question Answers as a Special Variant and Bypassing NLP for Corpora. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Yoshiya Shikama, Ryuta Kawano, Hiroki Matsutani, Hideharu Amano, Yusuke Nagasaka, Naoto Fukumoto, Michihiro Koibuchi A traffic-aware memory-cube network using bypassing. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
18Ranjit M. Christopher, Sungho Park, Sang Pil Han, Min-Kyu Kim Bypassing Performance Optimizers of Real Time Bidding Systems in Display Ad Valuation. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 577 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license