Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Sherwood R, Braud R, Bhattacharjee B.  2004.  Slurpie: a cooperative bulk data transfer protocol. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 2:941-951vol.2-941-951vol.2.
Sherwood R, Braud R, Bhattacharjee B.  2004.  A cooperative bulk transfer protocol. IEEE Infocom.
Sherwood R, Lee S, Bhattacharjee B.  2006.  Cooperative peer groups in NICE. Computer Networks. 50(4):523-544.
Sherwood R, Bhattacharjee B, Braud R.  2005.  Misbehaving TCP receivers can cause internet-wide congestion collapse. Proceedings of the 12th ACM conference on Computer and communications security. :383-392.
Sherwood R, Bender A, Spring N.  2008.  Discarte: a disjunctive internet cartographer. ACM SIGCOMM Computer Communication Review. 38(4):303-314.
Sherwood R, Spring N.  2006.  A platform for unobtrusive measurements on PlanetLab. Proceedings of the 3rd conference on USENIX Workshop on Real, Large Distributed Systems - Volume 3. :2-2.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Sheshagiri M, desJardins M, Finin T.  2003.  A planner for composing services described in DAML-S. International Conference on Automated Planning and Scheduling (ICAPS) 2003 Workshop on planning for web services.
Shet VD, Prasad VSN, Elgammal A, Yacoob Y, Davis LS.  2004.  Multi-cue exemplar-based nonparametric model for gesture recognition. Indian Conference on Computer Vision, Graphics and Image Processing. :16-18.
Shet V, Harwood D, Davis LS.  2006.  Multivalued default logic for identity maintenance in visual surveillance. Computer Vision–ECCV 2006. :119-132.
Shet VD, Neumann J, Ramesh V, Davis LS.  2007.  Bilattice-based Logical Reasoning for Human Detection. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Shet VD, Harwood D, Davis LS.  2006.  Top-down, bottom-up multivalued default reasoning for identity maintenance. Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks. :79-86.
Shet VD, Harwood D, Davis LS.  2005.  VidMAP: video monitoring of activity with Prolog. Advanced Video and Signal Based Surveillance, 2005. AVSS 2005. IEEE Conference on. :224-229.
Shevtsova N, Reggia JA.  1999.  Lesion effects in a bihemispheric letter-identification model. Neural Networks, 1999. IJCNN'99. International Joint Conference on. 1:215-218.
Shevtsova N, Reggia JA.  1999.  A neural network model of lateralization during letter identification. Journal of Cognitive Neuroscience. 11(2):167-181.
Shevtsova N, Reggia JA.  2002.  Effects of callosal lesions in a model of letter perception. Cognitive, Affective, & Behavioral Neuroscience. 2(1):37-37.
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
Shi Q, JaJa JF, Mortensen C.  2003.  Space-Efficient and Fast Algorithms for Multidimensional Dominance Reporting and Range Counting. UMIACS-TR-2003-101
Elaine Shi, Chan T, Rieffel E, Chow R, Song D.  2011.  Privacy-preserving aggregation of time-series data. 17
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Shi Q, JaJa JF.  2003.  An O(n)-Space O(log n/log log n + f)-Query Time Algorithm for 3-D Dominance Reporting. UMIACS-TR-2003-77
Shi Q, JaJa JF.  2002.  Efficient techniques for range search queries on earth science data. Scientific and Statistical Database Management, 2002. Proceedings. 14th International Conference on. :142-151.
Elaine Shi, Stoica I, Andersen DG, Perrig A.  2006.  OverDoSe: A generic DDoS protection service using an overlay network.
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.
Shi Q, JaJa JF.  2006.  Isosurface Extraction and Spatial Filtering using Persistent Octree (POT). Visualization and Computer Graphics, IEEE Transactions on. 12(5):1283-1290.

Pages