Publications
Export 7151 results:
Author [ Title] Type Year Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is [Clear All Filters]
1993. Chernoff-Hoeffding bounds for applications with limited independence. Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms. :331-340.
2011. CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
2002. CHI@20: fighting our way from marginality to power. CHI '02 extended abstracts on Human factors in computing systems. :688-691.
2002. The child as learner, critic, inventor, and technology design partner: An analysis of three years of Swedish student journals. International Journal of Technology and Design Education. 12(3):189-213.
2010. Children as codesigners of new technologies: Valuing the imagination to transform what is possible. New Directions for Youth Development. 2010(128):35-43.
2007. Children's interests and concerns when using the international children's digital library: a four-country case study. Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries. :167-176.
2010. Children's roles using keyword search interfaces at home. Proceedings of the 28th international conference on Human factors in computing systems. :413-422.
2005. Child's play: a comparison of desktop and physical interactive environments. Proceedings of the 2005 conference on Interaction design and children. :48-55.
2010. Chipping away at censorship firewalls with user-generated content. Proc. 19th USENIX Security Symposium, Washington, DC.
2007. Chit-based access control.
2016. Chitin promotes Mycobacterium ulcerans growth. FEMS Microbiology Ecology. 928565871(6):fiw067.
2000. A chosen ciphertext attack against several e-mail encryption protocols. Ninth USENIX Security Symposium.
2004. Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. :207-222.
2007. Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.
2000. Chromatic nearest neighbor searching: A query sensitive approach. Computational Geometry. 17(3–4):97-119.
2000. Chromosome Identification Using Hidden Markov Models: Comparison with Neural Networks, Singular Value Decomposition, Principal Components Analysis, and Fisher Discriminant Analysis. Laboratory Investigation. 80(11):1629-1641.
1999. Chunks in PLAN: Language support for programs as packets. PROCEEDINGS OF THE ANNUAL ALLERTON CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING. 37:PROCEEDINGSOFTHEANNUALALLERTONCONFERENCEONCOMMUNICATIONCONTROLANDCOMPUTING-PROCEEDINGSOFTHEANNUALALLERTONCONFER.
2008. CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments. Engineering of Computer-Based Systems, IEEE International Conference on the. :66-75.