Publications
Export 7151 results:
Author Title [ Type] Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2007. Software configuration management using ontologies. 3rd International Workshop on Semantic Web Enabled Software Engineering (SWESE 2007), Innsubruk, Austria.
1977. The software engineering laboratory: Objectives. Proceedings of the fifteenth annual SIGCPR conference. :256-269.
1989. Software metric classification trees help guide the maintenance of large-scale systems. , Conference on Software Maintenance, 1989., Proceedings. :116-123.
2005. Software synthesis from the dataflow interchange format. Proceedings of the 2005 workshop on Software and compilers for embedded systems. :37-49.
1990. Solving thematic divergences in machine translation. Proceedings of the 28th annual meeting on Association for Computational Linguistics. :127-134.
2007. Soma models of the behaviors of stakeholders in the afghan drug economy: A preliminary report. Proc. 2007 Intl. Conf. on Computational Cultural Dynamics. :78-86.
2008. The soma terror organization portal (stop): Social network and analytic tools for the real-time analysis of terror groups. First Intl. Workshop on Social Computing, Behavioral Modeling and Prediction.
2008. A sorting approach to indexing spatial data. ACM SIGGRAPH 2008 classes. :91:1–91:15-91:1–91:15.
2007. Sorting in space: multidimensional, spatial, and metric data structures for computer graphics applications. International Conference on Computer Graphics and Interactive Techniques.
2010. Sorting in space: multidimensional, spatial, and metric data structures for computer graphics applications. ACM SIGGRAPH ASIA 2010 Courses. :3:1–3:52-3:1–3:52.
2008. Sound field decomposition using spherical microphone arrays. IEEE International Conference on Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. :277-280.
1992. Space efficient 3-D model indexing. Computer Vision and Pattern Recognition, 1992. Proceedings CVPR '92., 1992 IEEE Computer Society Conference on. :439-444.
2002. Space-efficient approximate Voronoi diagrams. Proceedings of the thiry-fourth annual ACM symposium on Theory of computing. :721-730.
1995. Space-scale diagrams: understanding multiscale interfaces. Proceedings of the SIGCHI conference on Human factors in computing systems. :234-241.
2005. Space-time tradeoffs for approximate spherical range counting. Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms. :535-544.
1996. Space/time trade-offs for associative memory. Pattern Recognition, 1996., Proceedings of the 13th International Conference on. 4:296-302vol.4-296-302vol.4.
2002. SpaceTree: supporting exploration in large node link tree, design evolution and empirical evaluation. Information Visualization, 2002. INFOVIS 2002. IEEE Symposium on. :57-64.
2011. Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
1997. Spanish EuroWordNet and LCS-Based Interlingual MT. IN PROCEEDINGS OF THE MT SUMMIT WORKSHOP ON INTERLINGUAS IN MT.
2011. Sparse dictionary-based representation and recognition of action attributes. 2011 IEEE International Conference on Computer Vision (ICCV). :707-714.
2009. Sparse representation of cast shadows via ℓ1-regularized least squares. Computer Vision, 2009 IEEE 12th International Conference on. :583-590.
2010. Sparse representations and Random Projections for robust and cancelable biometrics. Control Automation Robotics Vision (ICARCV), 2010 11th International Conference on. :1-6.
2008. Sparse terrain pyramids. Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems. :15:1–15:10-15:1–15:10.
2009. Sparsity inspired selection and recognition of iris images. Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on. :1-6.