Publications
Export 7151 results:
Author [ Title] Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
1993. Evaluating surface intersections in lower dimensions. Second International Conference on Curves and Surfaces.
1990. Evaluating techniques for generating metric-based classification trees. Journal of Systems and Software. 12(3):209-218.
2001. Evaluating the XMT parallel programming model. High-Level Parallel Programming Models and Supportive Environments. :95-108.
1993. Evaluating three museum installations of a hypertext system. Sparks of innovation in human-computer interaction. 40:404-404.
2002. Evaluating translational correspondence using annotation projection. Proceedings of the 40th Annual Meeting on Association for Computational Linguistics. :392-399.
2008. Evaluating Visual Analytics at the 2007 VAST Symposium Contest. Computer Graphics and Applications, IEEE. 28(2):12-21.
2011. Evaluating visual and statistical exploration of scientific literature networks. 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). :217-224.
2004. Evaluating web page reliability across varied browsing environments. Proceedings of the 15th IEEE International Symposium on Software Reliability Engineering (ISSRE'04).
1996. Evaluating workflow and process automation in wide-area software development. Software Process Technology. :188-193.
2000. Evaluation challenges for a Federation of heterogeneous information providers: the case of NASA's Earth Science Information Partnerships. Enabling Technologies: Infrastructure for Collaborative Enterprises, 2000. (WET ICE 2000). Proeedings. IEEE 9th International Workshops on. :130-135.
1990. Evaluation criteria for functional specifications. Proceedings of the 12th international conference on Software engineering. :26-33.
2005. Evaluation Methodologies for Visual Analytics. Illuminating the Path: The Research and Development Agenda for Visual AnalyticsIlluminating the Path: The Research and Development Agenda for Visual Analytics. :150-157.
2009. An evaluation of connection characteristics for separating network attacks. International Journal of Security and Networks. 4(1):110-124.
1998. Evaluation of EuroWordNet-and LCS-based lexical resources for machine translation. Proceedings from First International Conference on Language Resources & Evaluation. :393-398.
2010. Evaluation of information retrieval for E-discovery. Artificial Intelligence and Law. 18:347-386.
1987. An evaluation of jump-ahead techniques in menu selection. Behaviour & Information Technology. 6(2):97-108.
1994. Evaluation of learning biases using probabilistic domain knowledge. Proceedings of the workshop on Computational learning theory and natural learning systems (vol. 2) : intersections between theory and experiment: intersections between theory and experiment. :97-112.
1985. Evaluation of Medical Expert Systems: A Case Study in Performance Analysis. Proceedings of the Ninth Annual Symposium on Computer Applications in Medical Care. :287-291.
2006. Evaluation of Multilingual and Multi-modal Information Retrieval-Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006, Alicante, Spain, September 19-21, 2006, Revised Selected Papers. Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006.
2005. Evaluation of resources for question answering evaluation. Proceedings of the 28th annual international ACM SIGIR conference on Research and development in information retrieval. :392-399.
2000. Evaluation of sense disambiguation given hierarchical tag sets. Computers and the Humanities. 34(1-2)
2010. Evaluation of state-of-the-art algorithms for remote face recognition. Image Processing (ICIP), 2010 17th IEEE International Conference on. :1581-1584.