Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Shi Q, JaJa JF.  2006.  Isosurface Extraction and Spatial Filtering using Persistent Octree (POT). Visualization and Computer Graphics, IEEE Transactions on. 12(5):1283-1290.
Shi Q, JaJa JF.  2005.  Techniques for indexing and querying temporal observations for a collection of objects. Algorithms and Computation. :822-834.
Shi Q, JaJa JF.  2003.  Fast algorithms for a class of temporal range queries. Algorithms and Data Structures. :91-102.
Shi Q, JaJa JF.  2005.  Novel transformation techniques using q-heaps with applications to computational geometry. SIAM Journal on Computing. 34(6):1474-1492.
Elaine Shi.  2008.  Evaluating predicates over encrypted data.
Shi Q, JaJa JF.  2003.  Fast Fractional Cascading and Its Applications. UMIACS-TR-2003-71
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Shi E, Stefanov E, Papamanthou C.  2013.  Practical Dynamic Proofs of Retrievability. CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . :325-336.
Shi Q, JaJa JF.  2005.  Optimal and near-optimal algorithms for generalized intersection reporting on pointer machines. Information Processing Letters. 95(3):382-388.
Shi Q, JaJa JF.  2003.  Fast Algorithms for 3-D Dominance Reporting and Counting. UMIACS-TR-2003-06
Shi Q, JaJa JF.  2005.  A new framework for addressing temporal range queries and some preliminary results. Theoretical Computer Science. 332(1–3):109-121.
Elaine Shi, Lu Y, Reid M.  2005.  Recovering from Intrusions in the OSPF Data-plane. Selected Project Reports, Spring 2005 Advanced OS & Distributed Systems (15-712).
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
Shi Q, JaJa JF.  2006.  Efficient Isosurface Extraction for Large Scale Time-Varying Data Using the Persistent Hyperoctree (PHOT). UMIACS-TR-2006-01
Shih YT, Elman H.  2000.  Iterative methods for stabilized discrete convection-diffusion problems. IMA journal of numerical analysis. 20(3):333-333.
Shih Y-T, Elman H.  1999.  Modified streamline diffusion schemes for convection-diffusion problems. Computer Methods in Applied Mechanics and Engineering. 174(1-2):137-151.
Shiloach Y, Vishkin U.  1982.  An O (logn) parallel connectivity algorithm. Journal of Algorithms. 3(1):57-67.
Shiloach Y, Vishkin U.  1982.  An O (n2log n) parallel max-flow algorithm. Journal of Algorithms. 3(2):128-146.
Shiloach Y, Vishkin U.  1981.  Finding the maximum, merging, and sorting in a parallel computation model. Journal of Algorithms. 2(1):88-102.
Shiloach Y, Vishkin U, An O.  1982.  parallel MAX-FLOW algorithm. Journal of Algorithms. 3:128-146.
Shin C, Doermann D, Rosenfeld A.  2003.  Measuring Structural Similarity of Document Pages for Searching Document Image Databases. 5th IASTEDInternational Conference on Signal and Image Processing. :320-325.
Shin M, Arbaugh WA.  2009.  Efficient peer-to-Peer lookup in multi-hop wireless networks. KSII Trans. Internet and Information Systems. 3(1):5-25.
Shin C, Doermann D.  1999.  Classification of Document Page Images. SDIUT99. :166-175.
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Shirdhonkar S, Jacobs DW.  2008.  Approximate earth mover's distance in linear time. Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. :1-8.

Pages