Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Goyal V, Katz J.  2008.  Universally composable multi-party computation with an unreliable common reference string. Theory of Cryptography. :142-154.
Goyal A, Daumé H, Venkatasubramanian S.  2009.  Streaming for large scale NLP: Language modeling. Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :512-520.
Gove R, Gramsky N, Kirby R, Sefer E, Sopan A, Dunne C, Shneiderman B, Taieb-Maimon M.  2011.  NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :19-26.
Gove R, Dunne C, Shneiderman B, Klavans J, Dorr BJ.  2011.  Evaluating visual and statistical exploration of scientific literature networks. 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). :217-224.
Gove R, Dunne C, Shneiderman B, Klavans J, Dorr BJ.  2011.  Understanding Scientific Literature Networks: An Evaluation of Action Science Explorer.
Gouker R, Gupta SK, Bruck H, Holzschuh T.  2006.  Manufacturing of multi-material compliant mechanisms using multi-material molding. The International Journal of Advanced Manufacturing Technology. 30(11):1049-1075.
Gou H, Wu M.  2006.  Fingerprinting digital elevation maps. Proceedings of SPIE. 6072:373-384.
Gou H, M. Wu.  2005.  Data hiding in curves with application to fingerprinting maps. Signal Processing, IEEE Transactions on. 53(10):3988-4005.
Gou H, M. Wu.  2007.  Improving Embedding Payload in Binary Imageswith "Super-Pixels". Image Processing, 2007. ICIP 2007. IEEE International Conference on. 3:III-277-III-280-III-277-III-280.
Gou H, Wu M.  2005.  Fingerprinting curves. Digital Watermarking. :13-28.
Gou H, M. Wu.  2004.  Data hiding in curves for collusion-resistant digital fingerprinting. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:51-54Vol.1-51-54Vol.1.
Gou H, Swaminathan A, Wu M.  2007.  Robust scanner identification based on noise features. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. 6505:0S–0T-0S–0T.
Gou H, Swaminathan A, M. Wu.  2007.  Noise Features for Image Tampering Detection and Steganalysis. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 6:VI-97-VI-100-VI-97-VI-100.
Gou H, Wu M.  2005.  Robust digital fingerprinting for curves. Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05). 2:529-532.
Gou H, Swaminathan A, M. Wu.  2009.  Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images. Information Forensics and Security, IEEE Transactions on. 4(3):476-491.
Gordon D, Perlis D.  1995.  Explicitly Biased Generalization. Goal-Driven Learning. :321-354.
Gordon S, Katz J, Vaikuntanathan V.  2010.  A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. :395-412.
Gordon DF, desJardins M.  1995.  Evaluation and selection of biases in machine learning. Machine Learning. 20(1):5-22.
Gordon S, Katz J, Kumaresan R, Yerukhimovich A.  2010.  Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
Gordon S, Katz J.  2010.  Partial fairness in secure two-party computation. Advances in Cryptology–EUROCRYPT 2010. :157-176.
Gordon S, Katz J.  2006.  Rational secret sharing, revisited. Security and Cryptography for Networks. :229-241.
Gordon S, Katz J.  2009.  Complete fairness in multi-party computation without an honest majority. Theory of Cryptography. :19-35.
Gordon DS, Hazay C, Katz J, Lindell Y.  2011.  Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.
Gordon D, Perlis D.  1989.  Explicitly biased generalization. Computational Intelligence. 5(2):67-81.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.

Pages