Publications
Export 7148 results:
[ Author] Title Type Year Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is [Clear All Filters]
2008. Discarte: a disjunctive internet cartographer. ACM SIGCOMM Computer Communication Review. 38(4):303-314.
2006. A platform for unobtrusive measurements on PlanetLab. Proceedings of the 3rd conference on USENIX Workshop on Real, Large Distributed Systems - Volume 3. :2-2.
2002. P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
2006. Touring the internet in a TCP sidecar. Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. :339-344.
2005. Misbehaving TCP receivers can cause internet-wide congestion collapse. Proceedings of the 12th ACM conference on Computer and communications security. :383-392.
2003. A planner for composing services described in DAML-S. International Conference on Automated Planning and Scheduling (ICAPS) 2003 Workshop on planning for web services.
2005. VidMAP: video monitoring of activity with Prolog. Advanced Video and Signal Based Surveillance, 2005. AVSS 2005. IEEE Conference on. :224-229.
2004. Multi-cue exemplar-based nonparametric model for gesture recognition. Indian Conference on Computer Vision, Graphics and Image Processing. :16-18.
2006. Multivalued default logic for identity maintenance in visual surveillance. Computer Vision–ECCV 2006. :119-132.
2007. Bilattice-based Logical Reasoning for Human Detection. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
2006. Top-down, bottom-up multivalued default reasoning for identity maintenance. Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks. :79-86.
1999. A neural network model of lateralization during letter identification. Journal of Cognitive Neuroscience. 11(2):167-181.
2002. Effects of callosal lesions in a model of letter perception. Cognitive, Affective, & Behavioral Neuroscience. 2(1):37-37.
1999. Lesion effects in a bihemispheric letter-identification model. Neural Networks, 1999. IJCNN'99. International Joint Conference on. 1:215-218.
2003. Fast algorithms for a class of temporal range queries. Algorithms and Data Structures. :91-102.
2008. Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
2005. Novel transformation techniques using q-heaps with applications to computational geometry. SIAM Journal on Computing. 34(6):1474-1492.
2013. Practical Dynamic Proofs of Retrievability. CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . :325-336.
2005. Recovering from Intrusions in the OSPF Data-plane. Selected Project Reports, Spring 2005 Advanced OS & Distributed Systems (15-712).
2005. Optimal and near-optimal algorithms for generalized intersection reporting on pointer machines. Information Processing Letters. 95(3):382-388.