Publications
Export 7151 results:
Author [ Title] Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2012. A feasibility study of crowdsourcing and google street view to determine sidewalk accessibility. :273-274.
1996. Feature discovery and classification of Doppler umbilical artery blood flow velocity waveforms. Computers in Biology and Medicine. 26(6):451-462.
2006. A feature generation algorithm for sequences with application to splice-site prediction. Knowledge Discovery in Databases: PKDD 2006. :553-560.
2008. A Feature Generation Algorithm with Applications to Biological Sequence Classification. Computational Methods. :355-355.
1998. Feature Recognition for Interactive Applications: Exploiting Distributed Resources. UMIACS-TR-94-126.1
2001. A feature-based approach to automated design of multi-piece sacrificial molds. Journal of Computing and Information Science in Engineering. 1:225-225.
2007. Features generated for computational splice-site prediction correspond to functional elements. BMC Bioinformatics. 8(1):410-410.
2004. Few amino acid positions in ıt rpoB are associated with most of the rifampin resistance in ıt Mycobacterium tuberculosis. BMC Bioinformatics. 5:137-137.
2008. On the fidelity of 802.11 packet traces. Proceedings of the 9th international conference on Passive and active network measurement. :132-141.
1999. Field-to-frame transcoding with spatial and temporal downsampling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 4:271-275vol.4-271-275vol.4.
2008. Figaro: A Novel Statistical Method for Vector Sequence Removal. Bioinformatics. 24(4):462-467.
1982. Fighting for the User.. Bulletin of the American Society for Information ScienceBulletin of the American Society for Information Science. 9(2):27-29.
2008. Fighting spam, phishing, and online scams at the network level. Proceedings of the 4th Asian Conference on Internet Engineering. :39-40.
2006. File System Support for Collaboration in theWide Area. Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on. :26-26.
2007. Filesystem activity following a SSH compromise: an empirical study of file sequences. :144-155.
2007. Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.
2006. Find that photo!: interface strategies to annotate, browse, and share. Communications of the ACM - Supporting exploratory search. 49(4):69-71.
1988. On finding a minimum dominating set in a tournament. Theoretical Computer Science. 61(2-3):307-316.
1990. Finding all nearest neighbors for convex polygons in parallel: a new lower bound technique and a matching algorithm. Discrete Applied Mathematics. 29(1):97-111.