Author of the publication

Using Hierarchical Change Mining to Manage Network Security Policy Evolution.

, , , , and . Hot-ICE, USENIX Association, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The power of basis selection in fourier sampling: hidden subgroup problems in affine groups., , , and . SODA, page 1113-1122. SIAM, (2004)LegalBench: A Collaboratively Built Benchmark for Measuring Legal Reasoning in Large Language Models., , , , , , , , , and 30 other author(s). CoRR, (2023)Zero-Shot Style Transfer in Text Using Recurrent Neural Networks., , and . CoRR, (2017)A unifying representation for a class of dependent random measures, , , and . CoRR, (2012)Some applications of generalized FFT's.. Groups and Computation, volume 28 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 329-369. DIMACS/AMS, (1995)Comparing higher-order spatial statistics and perceptual judgements in the stylometric analysis of art., , , and . EUSIPCO, page 1244-1248. IEEE, (2011)A fast hermite transform with applications to protein structure determination., , and . SNC, page 117-124. ACM, (2007)Wreath product cyclic group-based convolution: a new class of noncommutative filters., , , , and . ICASSP, page 356-359. IEEE, (2000)Intelligent Data Analysis of Intelligent Systems., , , , and . IDA, volume 6065 of Lecture Notes in Computer Science, page 8-17. Springer, (2010)Modeling the Association Between Physician Risky-Prescribing and the Complex Network Structure of Physician Shared-Patient Relationships., , , , , and . COMPLEX NETWORKS (3), volume 1143 of Studies in Computational Intelligence, page 194-207. Springer, (2023)