Publications
Export 7148 results:
[ Author] Title Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2011. Playing to Program: Towards an Intelligent Programming Tutor for RUR-PLE. Second AAAI Symposium on Educational Advances in Artificial Intelligence.
2005. Bayesian network learning with abstraction hierarchies and context-specific independence. Machine Learning: ECML 2005. :485-496.
1999. Visualization of high-dimensional model characteristics. Proceedings of the 1999 workshop on new paradigms in information visualization and manipulation in conjunction with the eighth ACM internation conference on Information and knowledge management. :6-8.
1998. Hybrid planning: An approach to integrating generative and case-based planning. Working Notes of the AAAI-98 Workshop on Case-Based Reasoning Integrations.
2006. Learning user preferences for sets of objects. Proceedings of the 23rd international conference on Machine learning. :273-280.
2007. Heuristic Search and Information Visualization Methods for School Redistricting. AI Magazine. 28(3):59-59.
2011. EAAI-10: The First Symposium on Educational Advances in Artificial Intelligence. AI Magazine. 32(1):91-91.
1995. How to succeed in graduate school: a guide for students and advisors: part II of II. Crossroads. 1(3):1-6.
1993. Workshop summary: AAAI-92 Workshop on Constraining Learning with Prior Knowledge. ACM SIGART Bulletin. 4(3):11-13.
2006. Heuristic search and information visualization methods for school redistricting. Proceedings of the 18th conference on Innovative applications of artificial intelligence - Volume 2. :1774-1781.
2011. Gene Coexpression Network Topology of Cardiac Development, Hypertrophy, and FailureClinical Perspective. Circulation: Cardiovascular GeneticsCirc Cardiovasc Genet. 4(1):26-35.
2001. A feature-based approach to automated design of multi-piece sacrificial molds. Journal of Computing and Information Science in Engineering. 1:225-225.
2003. Algorithms for computing global accessibility cones. Journal of Computing and Information Science in Engineering. 3:200-200.
2009. Complete Genome Sequence of Aggregatibacter (Haemophilus) Aphrophilus NJ8700. Journal of BacteriologyJ. Bacteriol.. 191(14):4693-4694.
2001. Efficient and Non-interactive Non-malleable Commitment. Advances in Cryptology — EUROCRYPT 2001Advances in Cryptology — EUROCRYPT 2001. 2045:40-59.
1980. An experiment using memorization/reconstruction as a measure of programmer ability. International Journal of Man-Machine Studies. 13(3):339-354.
2002. An unsupervised method for word sense tagging using parallel corpora. Proceedings of the 40th Annual Meeting on Association for Computational Linguistics. :255-262.
2010. A graph-theoretic approach to protect static and moving targets from adversaries. Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1. :299-306.
2007. Effects of cyclization on conformational dynamics and binding properties of Lys48-linked di-ubiquitin. Protein Science. 16(3):369-378.
2006. Name reference resolution in organizational email archives. SIAM International Conference on Data Mining. :20-22.