Publications
Export 7151 results:
Author Title [ Type] Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2006. A Communication Interface for Multiprocessor Signal Processing Systems. Proceedings of the 2006 IEEE/ACM/IFIP Workshop on Embedded Systems for Real Time Multimedia. :127-132.
2002. Communication-friendly encryption of multimedia. Multimedia Signal Processing, 2002 IEEE Workshop on. :292-295.
2010. Community-based, collaborative testing and analysis. Proceedings of the FSE/SDP workshop on Future of software engineering research. :239-244.
2007. Compact, low power wireless sensor network system for line crossing recognition. Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on. :2506-2509.
2006. A compact mathematical programming formulation for DNA motif finding. Combinatorial Pattern Matching. :233-245.
2004. Compact procedural implementation in DSP software synthesis through recursive graph decomposition. Software and compilers for embedded systems: 8th international workshop, SCOPES 2004, Amsterdam, The Netherlands, September 2-3, 2004: proceedings. 3199:47-47.
2000. Comparative Evaluation of a Natural Language Dialog Based System and a Menu-Driven System for Information Access: A Case Study. In Proceedings of the International Conference on Multimedia Information Retrieval (RIAO 2000).
2004. A Comparative Study of Spatial Indexing Techniques for Multidimensional Scientific Datasets. Scientific and Statistical Database Management, International Conference on. :171-171.
1998. Comparing images under variable illumination. Computer Vision and Pattern Recognition, 1998. Proceedings. 1998 IEEE Computer Society Conference on. :610-617.
2011. Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
2005. Comparing the Performance of High-Level Middleware Systems in Shared and Distributed Memory Parallel Environments. Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International. :30-30.
2011. Comparing values and sentiment using Mechanical Turk. Proceedings of the 2011 iConference. :783-784.
2004. A comparison of bug finding tools for Java. Software Reliability Engineering, 2004. ISSRE 2004. 15th International Symposium on. :245-256.
2003. A comparison of peer-to-peer search methods. Proceedings of the Sixth International Workshop on the Web and Databases.
2000. A comparison of voice controlled and mouse controlled web browsing. Proceedings of the fourth international ACM conference on Assistive technologies. :72-79.
1990. Competitive learning using competitive activation rules. Neural Networks, 1990., 1990 IJCNN International Joint Conference on. :285-291.
2000. Complete characterization of security notions for probabilistic private-key encryption. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :245-254.
2008. Complexity and Accessibility: Sorting in space: multidimensional, spatial, and metric data structures for CG applications. International Conference on Computer Graphics and Interactive Techniques.
1982. A complexity theory for unbounded fan-in parallelism. 23rd Annual Symposium on Foundations of Computer Science. :1-13.
2002. A component architecture for FPGA-based, DSP system design. Application-Specific Systems, Architectures and Processors, 2002. Proceedings. The IEEE International Conference on. :41-51.
2007. A Component Estimation Framework for Information Forensics. Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on. :397-400.
2006. Component Forensics of Digital Cameras: A Non-Intrusive Approach. Information Sciences and Systems, 2006 40th Annual Conference on. :1194-1199.
2007. Component-based Data Layout for Efficient Slicing of Very Large Multidimensional Volumetric Data. Scientific and Statistical Database Management, 2007. SSBDM '07. 19th International Conference on. :8-8.