default search action
Michael Hart
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Michael Hart, John McAllister:
Quantum Circuit Cutting Minimising Loss of Qubit Entanglement. CF 2024 - [c13]Michael Hart, John McAllister:
Reconstructing Cut Quantum Circuits Maximising Fidelity between Quantum States. CF 2024 - 2021
- [c12]Michael Hart, John McAllister, Leo Rogers, Charles Gillan:
An Emulation of Quantum Error-Correction on an FPGA device. FPL 2021: 104-108
2010 – 2019
- 2017
- [c11]Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy:
Predicting Cyber Threats with Virtual Security Products. ACSAC 2017: 189-199 - [c10]Kevin A. Roundy, Acar Tamersoy, Michael Spertus, Michael Hart, Daniel Kats, Matteo Dell'Amico, Robert Scott:
Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators. ACSAC 2017: 200-211 - 2016
- [j2]Chetan Kumar Verma, Michael Hart, Sandeep Bhatkar, Aleatha Parker-Wood, Sujit Dey:
Improving Scalability of Personalized Recommendation Systems for Enterprise Knowledge Workers. IEEE Access 4: 204-215 (2016) - 2015
- [c9]Chetan Kumar Verma, Michael Hart, Sandeep Bhatkar, Aleatha Parker-Wood, Sujit Dey:
Access Prediction for Knowledge Workers in Enterprise Data Repositories. ICEIS (1) 2015: 150-161 - 2014
- [c8]Alan Strickley, John Bertram, Dave Chapman, Michael Hart, Roy Hicks, Derek Kennedy, Mark Phillips:
A National Single Indicator for Schools in England: Helping Parents Make Informed Decisions. KCICTP/ITEM 2014: 331-345 - 2011
- [c7]Manoj Harpalani, Michael Hart, Sandesh Signh, Rob Johnson, Yejin Choi:
Language of Vandalism: Improving Wikipedia Vandalism Detection via Stylometric Analysis. ACL (2) 2011: 83-88 - [c6]Michael Hart, Claude Castille, Manoj Harpalani, Jonathan Toohill, Rob Johnson:
PhorceField: a phish-proof password ceremony. ACSAC 2011: 159-168 - [c5]Michael Hart, Pratyusa K. Manadhata, Rob Johnson:
Text Classification for Data Loss Prevention. PETS 2011: 18-37 - 2010
- [c4]Manoj Harpalani, Thanadit Phumprao, Megha Bassi, Michael Hart, Rob Johnson:
Wiki Vandalysis - Wikipedia Vandalism Analysis - Lab Report for PAN at CLEF 2010. CLEF (Notebook Papers/LABs/Workshops) 2010
2000 – 2009
- 2009
- [c3]Michael Hart, Claude Castille, Rob Johnson, Amanda Stent:
Usable Privacy Controls for Blogs. CSE (4) 2009: 401-408 - [c2]Michael Hart, Rob Johnson, Amanda Stent:
iTag: a personalized blog tagger. RecSys 2009: 297-300 - 2007
- [c1]Yuefeng Zhou, Michael Hart, Sunil Vadgama, Adel Rouz:
A Hierarchical Clustering Method in Wireless Ad Hoc Sensor Networks. ICC 2007: 3503-3509
1990 – 1999
- 1998
- [j1]Michael Hart:
Corporate liability for employee use of the internet and E-mail: Steps to take to reduce the risks. Comput. Law Secur. Rev. 14(4): 223-231 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint