Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Cukier M, Berthier R, Panjwani S, Tan S.  2006.  A Statistical Analysis of Attack Data to Separate Attacks. :383-392.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Cukier M, Ren J, Rubel P, Bakken DE, Karr DA.  1999.  Building dependable distributed objects with the AQuA architecture. :17-18.
Cukier M, Lyons J, Pandey P, Ramasamy HV, Sanders WH, Pal P, Webber F, Schantz R, Loyall J, Watro R.  2001.  Intrusion tolerance approaches in ITUA. 64
Cukier M, Sharma A.  2007.  Password Changes: Empirical Results. Computers and Software Engineering.
Cukier M, Panjwani S.  2007.  A Comparison between Internal and External Malicious Traffic. :109-114.
Cukier M, Powell D, Ariat J.  1999.  Coverage estimation methods for stratified fault-injection. Computers, IEEE Transactions on. 48(7):707-723.
Cukier M, Panjwani S.  2009.  Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. Security Privacy, IEEE. 7(1):42-48.
Craver SA, Wu M, Liu B, Stubblefield A, Swartzlander B, Wallach DS, Dean D, Felten EW.  2001.  Reading between the lines: Lessons from the SDMI challenge. Proceedings of the 10th USENIX Security Symposium. :13-17.
Craver SA, M. Wu, Liu B.  2001.  What can we reasonably expect from watermarks? Applications of Signal Processing to Audio and Acoustics, 2001 IEEE Workshop on the. :223-226.
Crary K, Hicks MW, Weirich S.  2000.  Safe and Flexible Dynamic Linking of Native Code. Technical Reports (CIS).
Cranston CB, Samet H.  2008.  Indexing planar point quartets via geometric attributes. Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems. :71:1–71:4-71:1–71:4.
Cranston CB, Samet H.  2006.  Efficient position-independent iconic search using an R-theta index. Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems. :27-34.
Cranston CB, Samet H.  2007.  Indexing Point Triples Via Triangle Geometry. Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. :936-945.
Coutard F|[ccedil]|ois, Crassous P, Droguet M|[euml]|l, Gobin E, Colwell RR, Pommepuy M, Hervio-Heath D.  2007.  Recovery in culture of viable but nonculturable Vibrio parahaemolyticus: regrowth or resuscitation? The ISME Journal. 1(2):111-120.
Costello L, Grinstein G, Plaisant C, Scholtz J.  2009.  Advancing User-Centered Evaluation of Visual Analytic Environments Through Contests. Information VisualizationInformation Visualization. 8(3):230-238.
Corrochano E B, Ogale AS, Fermüller C, Aloimonos Y.  2005.  Detecting Independent 3D Movement. Handbook of Geometric ComputingHandbook of Geometric Computing. :383-401.
Corretjer I, Hsu C, Bhattacharyya SS.  2006.  Configuration and representation of large-scale dataflow graphs using the dataflow interchange format. Proceedings of the IEEE Workshop on Signal Processing Systems, Banff, Canada. :10-15.
Corresponding DGB, Page S, Riolo R, Zellner M, Rand W.  2005.  Path dependence and the validation of agent-based spatial models of land use. International Journal of Geographical Information Science. 19(2):153-174.
Corrada Bravo H, Ramakrishnan R.  2007.  Optimizing mpf queries. Proceedings of the 2007 ACM SIGMOD international conference on Management of data - SIGMOD '07. :701-701.
Corrada Bravo H, Page D, Ramakrishnan R, Shavlik J, Costa VS.  2005.  A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
Corrada Bravo H, Eng KH, Keles S, Wahba G, Wright S.  2008.  Estimating Tree-Structured Covariance Matrices via Mixed-Integer Programming with an Application to Phylogenetic Analysis of Gene Expression. 1142
Cormode G, Paterson M, Sahinalp S C, Vishkin U.  2000.  Communication complexity of document exchange. Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms. :197-206.
Corcoran BJ, Swamy N, Hicks MW.  2009.  Cross-tier, label-based security enforcement for web applications. Proceedings of the 35th SIGMOD international conference on Management of data. :269-282.
Corcoran BJ, Swamy N, Hicks MW.  2007.  Combining provenance and security policies in a web-based document management system. On-line Proceedings of the Workshop on Principles of Provenance (PrOPr).

Pages