John Ioannidis

Results: 32



#Item
11

Offline Micropayments without Trusted Hardware Matt Blaze AT&T Labs – Research John Ioannidis AT&T Labs – Research

Add to Reading List

Source URL: crypto.com

Language: English - Date: 2001-03-05 21:20:36
    12Computer network security / Data / Internet protocols / Tunneling protocols / Internet standards / IPsec / Internet Key Exchange / Internet Security Association and Key Management Protocol / RADIUS / Computing / Cryptographic protocols / Network architecture

    Trust Management for IPsec Matt Blaze AT&T Labs - Research John Ioannidis AT&T Labs - Research

    Add to Reading List

    Source URL: crypto.com

    Language: English - Date: 2001-03-05 21:44:56
    13Network architecture / Network congestion / Differentiated services / Router / Rate limiting / Denial-of-service attack / Traffic shaping / Random early detection / IP traceback / Network performance / Computing / Internet

    Implementing Pushback: Router-Based Defense Against DDoS Attacks John Ioannidis AT&T Labs Research Abstract

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2002-02-11 23:30:53
    14Computer network security / Data / Internet protocols / Tunneling protocols / Internet standards / IPsec / Internet Key Exchange / Internet Security Association and Key Management Protocol / RADIUS / Computing / Cryptographic protocols / Network architecture

    Trust Management for IPsec Matt Blaze AT&T Labs - Research John Ioannidis AT&T Labs - Research

    Add to Reading List

    Source URL: www.isoc.org

    Language: English - Date: 2001-07-20 00:19:57
    15Medical statistics / Epidemiology / Clinical research / Systematic review / Design of experiments / Publication bias / Meta-analysis / Randomized controlled trial / Clinical trial / Science / Knowledge / Research

    ORIGINAL ARTICLE Why Most Discovered True Associations Are Inflated John P. A. Ioannidis Abstract: Newly discovered true (non-null) associations often have inflated effects compared with the true effect sizes. I discuss

    Add to Reading List

    Source URL: datacolada.org

    Language: English - Date: 2014-04-02 19:45:51
    16Systematic review / Meta-analysis / Hypothesis testing / Research methods / Clinical research / Publication bias / Randomized controlled trial / Plot / Study heterogeneity / Science / Statistics / Knowledge

    Clinical Trials http://ctj.sagepub.com/ An exploratory test for an excess of significant findings John PA Ioannidis and Thomas A Trikalinos Clin Trials: 245

    Add to Reading List

    Source URL: datacolada.org

    Language: English - Date: 2014-06-26 15:08:18
    17Research methods / Scientific method / Philosophy of science / Validity / Publication bias / Systematic review / John P. A. Ioannidis / Statistics / Inference / Science / Knowledge / Information

    “PoSI” — Valid Post-Selection Inference Andreas Buja joint work with Richard Berk, Lawrence Brown, Kai Zhang, Linda Zhao Department of Statistics, The Wharton School

    Add to Reading List

    Source URL: stat.wharton.upenn.edu

    Language: English - Date: 2014-01-18 13:56:18
    18Denial-of-service attacks / Denial-of-service attack / Internet Relay Chat / Software testing / Exploit / Vulnerability / Attack / Attack patterns / Computer insecurity / Cyberwarfare / Computer network security / Computer security

    DDoS for Zombies John "JI" Ioannidis AT&T Labs – Research

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2003-10-09 02:05:59
    19Design of experiments / Clinical research / Systematic review / Scientific method / Medical statistics / Clinical trial / Meta-analysis / Randomized controlled trial / Protocol / Science / Research / Knowledge

    Series Research: increasing value, reducing waste 2 Increasing value and reducing waste in research design, conduct, and analysis John P A Ioannidis, Sander Greenland, Mark A Hlatky, Muin J Khoury, Malcolm R Macleod, Da

    Add to Reading List

    Source URL: www.testingtreatments.org

    Language: English - Date: 2014-03-13 12:30:46
    20Software / Anti-spam techniques / Message transfer agent / Intrusion detection system / Malware / Antivirus software / Computer virus / VMware / Simple Mail Transfer Protocol / Email / Computer-mediated communication / Computing

    An Email Worm Vaccine Architecture Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, and Salvatore J. Stolfo Department of Computer Science, Columbia University {stelios,ji,angelos,sal}@cs.columbia.edu Abstract.

    Add to Reading List

    Source URL: www.cs.columbia.edu

    Language: English - Date: 2005-01-30 15:22:18
    UPDATE