Seth Hall

According to our database1, Seth Hall authored at least 11 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Approximate Buffers for Reducing Memory Requirements: Case Study on SKA.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2020

2016
Spicy: a unified deep packet inspection framework for safely dissecting all your data.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
To Trust, or not to Trust, that is the Question: Structural Properties of X.509 Certificates.
Tiny Trans. Comput. Sci., 2015

GPU-accelerated feature point matching using extended ColourFAST descriptors.
Proceedings of the 2015 International Conference on Image and Vision Computing New Zealand, 2015

2014
Creation and Implementation of Department-Wide Structured Reports: An Analysis of the Impact on Error Rate in Radiology Reports.
J. Digit. Imaging, 2014

Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014

2013
ColourFAST: GPU-based feature point detection and tracking on mobile devices.
Proceedings of the 28th International Conference on Image and Vision Computing New Zealand, 2013

No attack necessary: the surprising dynamics of SSL trust relationships.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Prepopulated Radiology Report Templates: A Prospective Analysis of Error Rate and Turnaround Time.
J. Digit. Imaging, 2012

A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

2011
GPU-based Image Analysis on Mobile Devices
CoRR, 2011


  Loading...