Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is   [Clear All Filters]
Conference Papers
Foster JS, Fahndrich M, Aiken A.  2000.  Polymorphic versus monomorphic points-to analysis. Proceedings of the 7th International Static Analysis Symposium, Lecture Notes in Computer Science. Springer Verlag.
Arya S, da Fonseca GD, Mount D.  2012.  Polytope approximation and the Mahler volume. Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms. :29-42.
Parno B, Wendlandt D, Elaine Shi, Perrig A, Maggs B, Hu Y-C.  2007.  Portcullis: protecting connection setup from denial-of-capability attacks. :289-300.
Hsu C-J, Bhattacharyya SS.  2005.  Porting DSP applications across design tools using the dataflow interchange format. Rapid System Prototyping, 2005. (RSP 2005). The 16th IEEE International Workshop on. :40-46.
Liu M-Y, Tuzel O, Veeraraghavan A, Chellappa R, Agrawal A, Okuda H.  2010.  Pose estimation in heavy clutter using a multi-flash camera. Robotics and Automation (ICRA), 2010 IEEE International Conference on. :2028-2035.
Biswas S, Chellappa R.  2010.  Pose-robust albedo estimation from a single image. Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. :2683-2690.
Citrin W, Halbert D, Hewitt C, Meyrowitz N, Shneiderman B.  1993.  Potentials and limitations of pen-based computers. Proceedings of the 1993 ACM conference on Computer science. :536-539.
Mount D, Netanyahu NS, Romanik K, Silverman R, Wu AY.  1997.  A practical approximation algorithm for the LMS line estimator. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :473-482.
Shi E, Stefanov E, Papamanthou C.  2013.  Practical Dynamic Proofs of Retrievability. CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . :325-336.
Bader DA, JaJa JF.  1996.  Practical parallel algorithms for dynamic data redistribution, median finding, and selection. Parallel Processing Symposium, 1996., Proceedings of IPPS '96, The 10th International. :292-301.
Moore JT, Hicks MW, Nettles S.  2001.  Practical programmable packets. IEEE INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 1:41-50vol.1-41-50vol.1.
Purang K, Purushothaman D, Traum D, Andersen C, Perlis D.  1999.  Practical reasoning and plan execution with active logic. Proceedings of the IJCAI-99 Workshop on Practical Reasoning and Rationality. :30-38.
Son SH, Agrawala AK.  1986.  Practicality of non-interfering checkpoints in distributed database systems. IEEE Real-Time Systems Symposium, New Orleans, Louisiana. :234-241.
Vishkin U.  1988.  PRAM algorithms: teach and preach. collection of position papers, IBM-NSF Workshop on$\textbackslashbackslash$ Opportunities and Constraints of Parallel Computing", IBM Almaden.
Wen X, Vishkin U.  2007.  PRAM-on-chip: first commitment to silicon. Proceedings of the nineteenth annual ACM symposium on Parallel algorithms and architectures. :301-302.
Vishkin U.  2000.  PRAM-On-Chip Vision. String Processing and Information Retrieval, 2000. SPIRE 2000. Proceedings. Seventh International Symposium on. :260-260.
Huang C-M, O'Leary DP.  1992.  Preconditioning parallel multisplittings for solving linear systems of equations. Proceedings of the 6th international conference on Supercomputing. :478-484.
Katz J, Sahai A, Waters B.  2008.  Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology. :146-162.
Natarajan V, Cleaveland R.  1996.  Predictability of real-time systems: a process-algebraic approach. Real-Time Systems Symposium, IEEE International. :82-82.
Miner D, desJardins M.  2009.  Predicting and Controlling System-Level Parameters of Multi-Agent Systems. 2009 AAAI Fall Symposium Series.
Wolski R, Spring N, Hayes J.  1999.  Predicting the CPU availability of time-shared Unix systems on the computational grid. The Eighth International Symposium on High Performance Distributed Computing, 1999. Proceedings. :105-112.
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
Hollingsworth J, Keleher PJ.  1998.  Prediction and Adaptation in Active Harmony. High-Performance Distributed Computing, International Symposium on. :180-180.
Helman DR, JaJa JF.  1999.  Prefix computations on symmetric multiprocessors. Parallel and Distributed Processing, 1999. 13th International and 10th Symposium on Parallel and Distributed Processing, 1999. 1999 IPPS/SPDP. Proceedings. :7-13.
Drapkin J, Perlis D.  1986.  A preliminary excursion into step-logics. Proceedings of the ACM SIGART international symposium on Methodologies for intelligent systems -. :262-269.

Pages