Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Dumitras T, Narasimhan P.  2005.  Fault-Tolerant Middleware and the Magical 1%. Middleware 2005. :431-441.
Hara K, Le V, Froehlich J.  2012.  A feasibility study of crowdsourcing and google street view to determine sidewalk accessibility. :273-274.
Baykal N, Reogia JA, Yalabik N, Erkmen A, Beksac M.S.  1996.  Feature discovery and classification of Doppler umbilical artery blood flow velocity waveforms. Computers in Biology and Medicine. 26(6):451-462.
Islamaj R, Getoor L, Wilbur W.  2006.  A feature generation algorithm for sequences with application to splice-site prediction. Knowledge Discovery in Databases: PKDD 2006. :553-560.
Dogan RI, Getoor L, Wilbur WJ.  2008.  A Feature Generation Algorithm with Applications to Biological Sequence Classification. Computational Methods. :355-355.
Kobla V, Doermann D, Lin K-I(D), Faloutsos C.  1996.  Feature Normalization for Video Indexing and Retrieval. LAMP-TR-003,CFAR-TR-847,CS-TR-3732
Regli WC, Gupta SK, Nau DS.  1998.  Feature Recognition for Interactive Applications: Exploiting Distributed Resources. UMIACS-TR-94-126.1
Regli WC, Gupta SK, Nau DS.  1994.  Feature Recognition for Manufacturability Analysis. ISR; TR 1994-10
Dhaliwal S, Gupta SK, Huang J, Kumar M.  2001.  A feature-based approach to automated design of multi-piece sacrificial molds. Journal of Computing and Information Science in Engineering. 1:225-225.
Baidya B, Gupta SK, Mukherjee T.  1998.  Feature-recognition for MEMS extraction. :13-16.
Dogan RI, Getoor L, Wilbur JW, Mount SM.  2007.  Features generated for computational splice-site prediction correspond to functional elements. BMC Bioinformatics. 8(1):410-410.
Sharma A, Martin JR, Anand N, Cukier M, Sanders WH.  2004.  Ferret: a host vulnerability checking tool. :389-394.
Cummings MP, Segal MR.  2004.  Few amino acid positions in ıt rpoB are associated with most of the rifampin resistance in ıt Mycobacterium tuberculosis. BMC Bioinformatics. 5:137-137.
Schulman A, Levin D, Spring N.  2008.  On the fidelity of 802.11 packet traces. Proceedings of the 9th international conference on Passive and active network measurement. :132-141.
Wee SJ, Apostolopoulos JG, Feamster N.  1999.  Field-to-frame transcoding with spatial and temporal downsampling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 4:271-275vol.4-271-275vol.4.
White J R, Roberts M, Yorke JA, Pop M.  2008.  Figaro: A Novel Statistical Method for Vector Sequence Removal. Bioinformatics. 24(4):462-467.
Shneiderman B.  1982.  Fighting for the User.. Bulletin of the American Society for Information ScienceBulletin of the American Society for Information Science. 9(2):27-29.
Feamster N.  2008.  Fighting spam, phishing, and online scams at the network level. Proceedings of the 4th Asian Conference on Internet Engineering. :39-40.
Bender A, Sherwood R, Monner D, Goergen N, Spring N, Bhattacharjee B.  2009.  Fighting Spam with the NeighborhoodWatch DHT. IEEE INFOCOM 2009. :1755-1763.
Gaburici V, Keleher P, Bhattacharjee B.  2006.  File System Support for Collaboration in theWide Area. Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International Conference on. :26-26.
Molina J, Chorin X, Cukier M.  2007.  Filesystem activity following a SSH compromise: an empirical study of file sequences. :144-155.
Ramachandran A, Feamster N, Vempala S.  2007.  Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.
Shneiderman B, Bederson BB, Drucker SM.  2006.  Find that photo!: interface strategies to annotate, browse, and share. Communications of the ACM - Supporting exploratory search. 49(4):69-71.
Megiddo N, Vishkin U.  1988.  On finding a minimum dominating set in a tournament. Theoretical Computer Science. 61(2-3):307-316.
Schieber B, Vishkin U.  1990.  Finding all nearest neighbors for convex polygons in parallel: a new lower bound technique and a matching algorithm. Discrete Applied Mathematics. 29(1):97-111.

Pages