Publications
Export 7151 results:
Author Title Type [ Year] Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2000. Convexity in Perceptual Completion. KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE. :73-90.
2000. Coordinating overviews and detail views of WWW log data. Workshop on New Paradigms in Information Visualization and Manipulation (NPIVM 2000), ACM Press.
2000. Cortical inhibition as explained by the competitive distribution hypothesis. Network models for control and processing. :31-62.
2000. Creating creativity: user interfaces for supporting innovation. ACM Trans. Comput.-Hum. Interact.. 7(1):114-138.
2000. Data and Content Based Adaptation for Video Over Low Bandwidth Networks. SPIE- Multimedia and Systems Applicaitons III. :69-78.
2000. Data hiding in digital binary image. Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on. 1:393-396vol.1-393-396vol.1.
2000. DataCutter: Middleware for filtering very large scientific datasets on archival storage systems. NASA conference publication. :119-134.
2000. The decompositional approach to matrix computation. Computing in Science Engineering. 2(1):50-59.
2000. Design and use of linear models for image motion analysis. International Journal of Computer Vision. 36(3):171-193.
2000. Design of a Framework for Data-Intensive Wide-Area Applications. Heterogeneous Computing Workshop. :116-116.
2000. Designing StoryRooms: interactive storytelling spaces for children. Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques. :95-104.
2000. Designing storytelling technologies to encouraging collaboration between young children. Proceedings of the SIGCHI conference on Human factors in computing systems. :556-563.
2000. Detecting independent motion: The statistics of temporal continuity. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 22(8):768-773.
2000. Direct annotation: a drag-and-drop strategy for labeling photos. IEEE International Conference on Information Visualization, 2000. Proceedings. :88-95.
2000. DNS of a Mach 4 boundary layer with chemical reactions. AIAA, Aerospace Sciences Meeting and Exhibit, 38 th, Reno, NV.
2000. Domain name based visualization of Web histories in a zoomable user interface. 11th International Workshop on Database and Expert Systems Applications, 2000. Proceedings. :591-598.
2000. A dual interpretation of “standard constraints” in parametric scheduling. Formal Techniques in Real-Time and Fault-Tolerant Systems. :205-223.
2000. Dynamics of vapor bubbles with nonequilibrium phase transitions in isotropic acoustic fields. Physics of Fluids. 12:71-71.
2000. On the efficiency of local decoding procedures for error-correcting codes. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :80-86.
2000. Efficient expected-case algorithms for planar point location. Algorithm Theory-SWAT 2000. :537-543.