Publications
Export 7151 results:
Author Title [ Type] Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2011. A partial least squares framework for speaker recognition. Acoustics, Speech and Signal Processing (ICASSP), 2011 IEEE International Conference on. :5276-5279.
1998. Partial online cycle elimination in inclusion constraint graphs. ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI).
2006. Partially overlapped channels not considered harmful. Proceedings of the joint international conference on Measurement and modeling of computer systems. :63-74.
2006. Participatory design with proxies: developing a desktop-PDA system to support people with aphasia. Proceedings of the SIGCHI conference on Human Factors in computing systems. :151-160.
2006. Participatory, embodied, multi-agent simulation. Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems. :1457-1458.
2001. Partitioning activities for agents. INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE. 17:1218-1228.
1980. Path expressions for complex queries and automatic database program conversion. Proceedings of the sixth international conference on Very Large Data Bases - Volume 6. :33-44.
2008. Path projection for user-centered static analysis tools. Proceedings of the 8th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. :57-63.
2008. A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
2006. PCFGs with syntactic and prosodic indicators of speech repairs. Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics. :161-168.
2005. Pedestrian classification from moving platforms using cyclic motion pattern. Image Processing, 2005. ICIP 2005. IEEE International Conference on. 2:II-854-7-II-854-7.
2005. Pedestrian classification from moving platforms using cyclic motion pattern. IEEE International Conference on Image Processing, 2005. ICIP 2005. 2:II-854-7-II-854-7.
2007. PeerWise discovery and negotiation of faster paths. Proc. Workshop on Hot Topics in Networks (HotNets).
1992. Perceptual computational advantages of tracking. , 11th IAPR International Conference on Pattern Recognition, 1992. Vol.I. Conference A: Computer Vision and Applications, Proceedings. :599-602.
2002. Performance evaluation of a QoS-aware framework for providing tunable consistency and timeliness. :214-223.
2002. Performance evaluation of object detection algorithms. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 3:965-969vol.3-965-969vol.3.
2010. Performance Evaluation Tools for Zone Segmentation and Classification (PETS). International Conference on Pattern Recognition. :503-506.
1999. Performance impact of proxies in data intensive client-server applications. Proceedings of the 13th international conference on Supercomputing. :383-390.
2007. Performance Measurement of Novice HPC Programmers Code. Proceedings of the 3rd International Workshop on Software Engineering for High Performance Computing Applications. :3–-3–.
1998. Performance measurement using low perturbation and high precision hardware assists. , The 19th IEEE Real-Time Systems Symposium, 1998. Proceedings. :379-388.
2003. Performance of detection statistics under collusion attacks on independent multimedia fingerprints. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 1:I-205-8vol.1-I-205-8vol.1.
2001. Performance optimization for data intensive grid applications. Active Middleware Services, 2001. Third Annual International Workshop on. :97-105.