Publications
Export 7151 results:
Author Title [ Type] Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2007. COST: An Approach for Camera Selection and Multi-Object Inference Ordering in Dynamic Scenes. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
2006. Cost-sensitive learning with conditional Markov networks. Proceedings of the 23rd international conference on Machine learning. :801-808.
1999. Coupling multiple simulations via a high performance customizable database system. Proceedings of the Ninth SIAM Conference on Parallel Processing for Scientific Computing.
2001. Coverage criteria for GUI testing. Proceedings of the 8th European software engineering conference held jointly with 9th ACM SIGSOFT international symposium on Foundations of software engineering. :256-267.
2007. Covering array sampling of input event sequences for automated gui testing. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :405-408.
2004. Covering arrays for efficient fault characterization in complex configuration spaces. ACM SIGSOFT Software Engineering Notes. 29:45-54.
2009. CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast. INFOCOM 2009, IEEE. :91-99.
2003. The CPR model for summarizing video. Proceedings of the 1st ACM international workshop on Multimedia databases. :2-9.
2007. Creating a Robust Desktop Grid using Peer-to-Peer Services. Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International. :1-7.
2011. Creating contextual help for GUIs using screenshots. Proceedings of the 24th annual ACM symposium on User interface software and technology. :145-154.
2002. Creation of virtual auditory spaces. 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP). 2
2009. Creativity challenges and opportunities in social computing. Proceedings of the 27th international conference extended abstracts on Human factors in computing systems. :3283-3286.
2002. Creativity support tools: a tutorial overview. Proceedings of the 4th conference on Creativity & cognition. :1-2.
2011. Cross Language Entity Linking. IJCNLP: International Joint Conference on Natural Language Processing.
2009. Cross-document coreference resolution: A key technology for learning by reading. AAAI Spring Symposium on Learning by Reading and Learning to Read.
2007. Cross-layer latency minimization in wireless networks with SINR constraints. Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. :110-119.
2008. CrossNet: a framework for crossover with network-based chromosomal representations. Proceedings of the 10th annual conference on Genetic and evolutionary computation. :1057-1064.
2006. Cross-Path PDMA-Based Error Protection for Streaming Multiuser Video over Multiple Paths. Image Processing, 2006 IEEE International Conference on. :21-24.
2008. Cross-task knowledge-constrained self training. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :680-688.
2009. Cross-tier, label-based security enforcement for web applications. Proceedings of the 35th SIGMOD international conference on Management of data. :269-282.
1998. Culture conflicts in software engineering technology transfer. NASA Goddard Software Engineering Workshop. :52-52.
2002. Customizable auditory displays. Proceedings of the International Conference on Auditory Display. :167-176.