Author of the publication

Password Managers: Attacks and Defenses.

, , , , and . USENIX Security Symposium, page 449-464. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Memory-based control with recurrent neural networks., , , and . CoRR, (2015)Authenticity, Relatability and Collaborative Approaches to Sharing Knowledge about Assistive Living Technology., , , , and . CSCW, page 82-94. ACM, (2015)Non-Linear Monte-Carlo Search in Civilization II., , and . IJCAI, page 2404-2410. IJCAI/AAAI, (2011)Looking Backwards, Looking Forward: Cyberculture Studies 1990-2000. Web.Studies: Rewiring Media Studies for the Digital Age, Arnold, London, (2000)Scene understanding for a high-mobility walking robot., , , , , , and . IROS, page 1144-1151. IEEE, (2015)Prioritized Experience Replay, , , and . (2015)cite arxiv:1511.05952Comment: Published at ICLR 2016.Mastering the game of Go with deep neural networks and tree search, , , , , , , , , and . (2016)High Performance Outdoor Navigation from Overhead Data using Imitation Learning., , and . Robotics: Science and Systems, The MIT Press, (2008)Cooperative Pathfinding.. AIIDE, page 117-122. AAAI Press, (2005)Learning Autonomous Driving Styles and Maneuvers from Expert Demonstration., , and . ISER, volume 88 of Springer Tracts in Advanced Robotics, page 371-386. Springer, (2012)