Publications
Export 7151 results:
Author [ Title] Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2010. FPGA-based design and implementation of the 3GPP-LTE physical layer using parameterized synchronous dataflow techniques. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1510-1513.
2008. Fpga-based prototype of a pram-on-chip processor. Proceedings of the 5th conference on Computing frontiers. :55-66.
2005. Frame semantic enhancement of lexical-semantic resources. Proceedings of the ACL-SIGLEX Workshop on Deep Lexical Acquisition. :57-66.
2005. A framework for decomposing reputation in MAS into competence and integrity. Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. :1253-254.
1998. A framework for modeling appearance change in image sequences. Computer Vision, 1998. Sixth International Conference on. :660-667.
1984. A framework for self-describing and self-documenting database systems. NBS Trends and Application Conference.
2005. A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
2008. A Framework for Software Engineering Experimental Replications. Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on. :203-212.
2010. A framework for theoretical analysis of content fingerprinting. Proc. of SPIE Media Forensics and Security.
2004. Free-Living to Freewheeling: The Evolution of Vibrio cholerae from Innocence to Infamy. Infectious Disease and Host-Pathogen EvolutionInfectious Disease and Host-Pathogen Evolution. :198-198.
2006. Frequency Independent Flexible Spherical Beamforming Via Rbf Fitting. 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 5:V-V-V-V.
1998. Frequentist and Bayesian Coverage Estimations for Stratified Fault-Injection. DEPENDABLE COMPUTING AND FAULT TOLERANT SYSTEMS. 11:43-62.
1997. From algorithm parallelism to instruction-level parallelism: An encode-decode chain using prefix-sum. Proceedings of the ninth annual ACM symposium on Parallel algorithms and architectures. :260-271.
2010. From bowling alone to tweeting together: technology-mediated social participation. Interactions. 17(2):64-67.
2000. From instances to classes in probabilistic relational models. Proc. ICML 2000 Workshop on Attribute-Value and Relational Learning.
2009. From New Zealand to Mongolia: Co-designing and deploying a digital library for the world's children. Special issue of Children, Youth and Environments: Children in Technological Environments: Interaction, Development, and Design.
2006. From sample similarity to ensemble similarity: probabilistic distance measures in reproducing kernel Hilbert space. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 28(6):917-929.