#### Filter Results:

- Full text PDF available (184)

#### Publication Year

1985

2016

- This year (0)
- Last 5 years (33)
- Last 10 years (65)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Martín Abadi, Ashish Agarwal, +37 authors Xiaoqiang Zheng
- ArXiv
- 2015

TensorFlow [1] is an interface for expressing machine learning algorithms, and an implementation for executing such algorithms. A computation expressed using TensorFlow can be executed with little or no change on a wide variety of heterogeneous systems, ranging from mobile devices such as phones and tablets up to large-scale distributed systems of hundreds… (More)

- Michael Burrows, Martín Abadi, Roger M. Needham
- SOSP
- 1989

Authentication protocols are the basis of security in many distributed systems, and it is therefore essential to ensure that these protocols function correctly. Unfortunately, their design has been extremely error prone. Most of the protocols found in the literature contain redundancies or security flaws. A simple logic has allowed us to describe the… (More)

- Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
- ACM Conference on Computer and Communications…
- 2005

Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such attacks from arbitrarily controlling program behavior. CFI enforcement is simple, and its guarantees can be established formally even with respect to powerful adversaries. Moreover,… (More)

- Martín Abadi, Cédric Fournet
- POPL
- 2001

We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are the main motivating examples for our work; it also appears in other programming-language contexts. Specifically, we introduce a simple, general extension of the pi calculus with value… (More)

- Martín Abadi, Luca Cardelli
- Monographs in Computer Science
- 1996

Outline ¥ Topic of this tutorial: a foundation for object-oriented languages based on object calculi. ¥ The mainstream. ¥ We review only common, kernel properties.

- Martín Abadi, Andrew D. Gordon
- ACM Conference on Computer and Communications…
- 1997

We i n troduce the spi calculus, an extension of the pi calculus designed for the description and analysis of cryptographic protocols. We show h o w to use the spi calculus, particularly for studying authen-tication protocols. The pi calculus without extension suuces for some abstract protocols; the spi calculus enables us to consider cryptographic issues… (More)

- Martín Abadi, Paul Barham, +19 authors Xiaoqiang Zhang
- OSDI
- 2016

TensorFlow is a machine learning system that operates at large scale and in heterogeneous environments. Tensor-Flow uses dataflow graphs to represent computation, shared state, and the operations that mutate that state. It maps the nodes of a dataflow graph across many machines in a cluster, and within a machine across multiple computational devices,… (More)

- Martín Abadi, Leslie Lamport
- [1988] Proceedings. Third Annual Information…
- 1988

Refinement mappings are used to prove that a lower-level specification correctly implements a higher-level one. The authors consider specifications consisting of a state machine (which may be infinite-state) that specifies safety requirements and an arbitrary supplementary property that specifies liveness requirements. A refinement mapping from a… (More)

- Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti
- ACM Trans. Inf. Syst. Secur.
- 2009

Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, control-flow integrity (CFI), can prevent such attacks from arbitrarily controlling program behavior. CFI enforcement is simple and its guarantees can be established formally, even with respect to powerful adversaries. Moreover,… (More)

- Martín Abadi, Phillip Rogaway
- Journal of Cryptology
- 2000

Two distinct, rigorous views of cryptography have developed over the years, in two mostly separate communities. One of the views relies on a simple but effective formal approach; the other, on a detailed computational model that considers issues of complexity and probability. There is an uncomfortable and interesting gap between these two approaches to… (More)