Publications
Export 7151 results:
Author Title [ Type] Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
1995. Organization overviews and role management: inspiration for future desktop environments. Proceedings of the Fourth Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, 1995. :14-22.
1987. An output sensitive algorithm for computing visibility graphs. Foundations of Computer Science, 1987., 28th Annual Symposium on. :11-19.
2010. Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks. :37-42.
2010. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
2006. Overconfidence or paranoia? search in imperfect-information games PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE. 21:1045-1045.
2002. OZONE: A zoomable interface for navigating ontology information. Proceedings of the Working Conference on Advanced Visual Interfaces. :139-143.
2011. P2C2: Programmable pixel compressive camera for high speed imaging. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :329-336.
2002. P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
2002. Page classification through logical labelling. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 3:477-480vol.3-477-480vol.3.
2009. Page Rule-Line Removal using Linear Subspaces in Monochromatic Handwritten Arabic Documents. Intl. Conf. on Document Analysis and Recognition (ICDAR 09). :768-772.
1995. Parallel algorithms for database operations and a database operation for parallel algorithms. Parallel Processing Symposium, 1995. Proceedings., 9th International. :173-179.
1996. Parallel algorithms for personalized communication and sorting with an experimental study (extended abstract). Proceedings of the eighth annual ACM symposium on Parallel algorithms and architectures. :211-222.
2005. Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
1986. A parallel processing strategy for evaluating recursive queries. Proceedings of the 12th International Conference on Very Large Data Bases. :412-419.
1992. Parallel program performance metrics: a comprison and validation. Proceedings of the 1992 ACM/IEEE conference on Supercomputing. :4-13.
1988. Parallel set covering algorithms. Artificial Intelligence Applications, 1988., Proceedings of the Fourth Conference on. :274-279.
1991. Parallel transitive closure computations using topological sort. , Proceedings of the First International Conference on Parallel and Distributed Information Systems, 1991. :122-129.
1992. Parameterization of the interlingua in machine translation. Proceedings of the 14th conference on Computational linguistics - Volume 2. :624-630.
1992. A parameterized approach to integrating aspect with lexical-semantics for machine translation. Proceedings of the 30th annual meeting on Association for Computational Linguistics. :257-264.
1998. Parameterized modeling and recognition of activities. Computer Vision, 1998. Sixth International Conference on. :120-127.
2006. Parametric Hand Tracking for Recognition of Virtual Drawings. Computer Vision Systems, 2006 ICVS '06. IEEE International Conference on. :6-6.
1992. Partial evaluation of high-level imperative programming languages with applications in hard real-time systems. Proceedings of the 19th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :269-280.