Publications
Export 7151 results:
Author Title [ Type] Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2011. Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :734-737.
2010. Simulating dynamic communication systems using the core functional dataflow model. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1538-1541.
1992. Simulating Pressure Variations in Handwriting. Proceedings of the Twenty-Third Annual Modeling and Simulation Conference. :2141-2148.
2007. Simulation and Analysis of Human Walking Motion. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 1:I-797-I-800-I-797-I-800.
2000. Simulation based learning environments and the use of learning histories. CHI '00 extended abstracts on Human factors in computing systems. :2-3.
1984. Simulation of phonemic errors using artificial intelligence symbol processing techniques. Proceedings of the 17th annual symposium on Simulation. :49-64.
2007. Simultaneous appearance modeling and segmentation for matching people under occlusion. Proceedings of the 8th Asian conference on Computer vision - Volume Part II. :404-413.
2004. Simultaneous background and foreground modeling for tracking in surveillance video. Image Processing, 2004. ICIP '04. 2004 International Conference on. 2:1053-1056Vol.2-1053-1056Vol.2.
2003. Simultaneous pose and correspondence determination using line features. Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on. 2:II-424-II-431vol.2-II-424-II-431vol.2.
2003. Simultaneous tracking and recognition of human faces from video. Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on. 3:III-225-8vol.3-III-225-8vol.3.
1999. Single display groupware: a model for co-present collaboration. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :286-293.
1993. Situated reasoning within tight deadlines and realistic space and computation bounds. Proc. Common Sense. 93
1999. Skip Strips: maintaining triangle strips for view-dependent rendering. Visualization '99. Proceedings. :131-518.
2004. Skoll: distributed continuous quality assurance. Software Engineering, 2004. ICSE 2004. Proceedings. 26th International Conference on. :459-468.
2004. Slurpie: a cooperative bulk data transfer protocol. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 2:941-951vol.2-941-951vol.2.
2011. Smale-like decomposition and forman theory for discrete scalar fields. Discrete Geometry for Computer Imagery. :477-488.
2002. A Smale-like decomposition for discrete scalar fields. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 1:184-187vol.1-184-187vol.1.
2000. Smart videoconferencing. 2000 IEEE International Conference on Multimedia and Expo, 2000. ICME 2000. 3:1597-1600vol.3-1597-1600vol.3.
2002. Smiling faces are better for face recognition. Fifth IEEE International Conference on Automatic Face and Gesture Recognition, 2002. Proceedings. :52-57.
2000. Snap-together visualization: a user interface for coordinating visualizations via relational schemata. Proceedings of the working conference on Advanced visual interfaces. :128-135.
1993. SOCAP: lessons learned in automating military operations planning. Proceedings of the 6th international conference on Industrial and engineering applications of artificial intelligence and expert systems. :384-393.
2006. Social Capital in Friendship-Event Networks. Data Mining, 2006. ICDM '06. Sixth International Conference on. :959-964.
2011. Social discovery framework: building capacity and seeking solutions. Proceedings of the 8th ACM conference on Creativity and cognition. :307-308.
1996. Social impact statements: engaging public participation in information technology design. Proceedings of the symposium on Computers and the quality of life. :90-96.
2006. A Software Architectural Approach to Security by Design. Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International. 2:83-86.