Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kenneth E. Shirley
@inproceedings{DBLP:conf/dsaa/FlynnSW16, author = {Cheryl J. Flynn and Kenneth E. Shirley and Wei Wang}, title = {Deconstructing Domain Names to Reveal Latent Topics}, booktitle = {2016 {IEEE} International Conference on Data Science and Advanced Analytics, {DSAA} 2016, Montreal, QC, Canada, October 17-19, 2016}, pages = {518--527}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/DSAA.2016.63}, doi = {10.1109/DSAA.2016.63}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/dsaa/FlynnSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangS15d, author = {Wei Wang and Kenneth E. Shirley}, title = {Breaking Bad: Detecting malicious domains using word segmentation}, journal = {CoRR}, volume = {abs/1506.04111}, year = {2015}, url = {http://arxiv.org/abs/1506.04111}, eprinttype = {arXiv}, eprint = {1506.04111}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WangS15d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cgf/KarloffS13, author = {Howard J. Karloff and Kenneth E. Shirley}, title = {Maximum Entropy Summary Trees}, journal = {Comput. Graph. Forum}, volume = {32}, number = {3}, pages = {71--80}, year = {2013}, url = {https://doi.org/10.1111/cgf.12094}, doi = {10.1111/CGF.12094}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cgf/KarloffS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.