Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is   [Clear All Filters]
Conference Papers
Martin, M.P.  2005.  Preliminary Study of the SGS Time Scales for Compressible Boundary Layers using DNS Data. 43rd AIAA Aerospace Sciences Meeting and Exhibit.
Taylor EM, Martin, M.P, Smits AJ.  2005.  Preliminary Study of the Turbulence Structure in Supersonic Boundary Layers using DNS Data. 35th AIAA Fluid Dynamics Conference.
Hourcade JP, Bederson BB, Druin A.  2004.  Preschool children's use of mouse buttons. CHI'04 extended abstracts on Human factors in computing systems. :1411-1412.
Miller M, Perlis D.  1993.  Presentations and this and that: logic in action. Proceedings of the 15th Annual Conference of the Cognitive Science Society, Boulder, Colorado. 251
Zheleva E, Getoor L.  2008.  Preserving the privacy of sensitive relationships in graph data. Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. :153-171.
Aloimonos Y, Rosenfeld A.  1994.  Principles of computer vision. Handbook of pattern recognition and image processing (vol. 2). :1-15.
Yoon I-C, Sussman A, Memon AM, Porter A.  2009.  Prioritizing component compatibility tests via user preferences. Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. :29-38.
Fayzullin M, V.S. Subrahmanian, Albanese M, Picariello A.  2004.  The priority curve algorithm for video summarization. Proceedings of the 2nd ACM international workshop on Multimedia databases. :28-35.
Mashima D, Elaine Shi, Chow R, Sarkar P, Li C, Song D.  2011.  Privacy settings from contextual attributes: A case study using Google Buzz. :257-262.
Elaine Shi, Chan T, Rieffel E, Chow R, Song D.  2011.  Privacy-preserving aggregation of time-series data. 17
Hajiaghayi MT, Jain K.  2006.  The prize-collecting generalized Steiner tree problem via a new approach of primal-dual schema. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :631-640.
Plangprasopchok A, Lerman K, Getoor L.  2011.  A probabilistic approach for learning folksonomies from structured data. Proceedings of the fourth ACM international conference on Web search and data mining. :555-564.
De la Torre F, Yacoob Y, Davis LS.  2000.  A probabilistic framework for rigid and non-rigid appearance based tracking and recognition. Automatic Face and Gesture Recognition, 2000. Proceedings. Fourth IEEE International Conference on. :491-498.
Han B, Joo S-W, Davis LS.  2007.  Probabilistic Fusion Tracking Using Mixture Kernel-Based Bayesian Filtering. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Parker A, Yaman F, Nau DS, V.S. Subrahmanian.  2007.  Probabilistic go theories.
Deshpande A, Sarawagi S.  2007.  Probabilistic graphical models and their role in databases. Proceedings of the 33rd international conference on Very large data bases. :1435-1436.
Zhou SK, Chellappa R.  2004.  Probabilistic identity characterization for face recognition. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 2:II-805-II-812Vol.2-II-805-II-812Vol.2.
Getoor L, Friedman N, Taskar B.  2001.  Probabilistic models of relational structure. In Proc. ICML.
Domke J, Aloimonos Y.  2006.  A probabilistic notion of correspondence and the epipolar constraint. Proceedings of the Third International Symposium on 3D Data Processing, Visualization, and Transmission (3DPVT'06). :41-48.
Chellappa R, Kruger V, Zhou S.  2002.  Probabilistic recognition of human faces from video. Image Processing. 2002. Proceedings. 2002 International Conference on. 1:I-41-I-44vol.1-I-41-I-44vol.1.
Darwish K, Oard D.  2003.  Probabilistic structured query methods. Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval. :338-344.
Elgammal A, Duraiswami R, Davis LS.  2003.  Probabilistic tracking in joint feature-spatial spaces. Computer Vision and Pattern Recognition, 2003. Proceedings. 2003 IEEE Computer Society Conference on. 1:I-781-I-788vol.1-I-781-I-788vol.1.
Resnik P.  1992.  Probabilistic tree-adjoining grammar as a framework for statistical natural language processing. Proceedings of the 14th conference on Computational linguistics-Volume 2. :418-424.
Sanders WH, Cukier M, Webber F, Pal P, Watro R.  2002.  Probabilistic validation of intrusion tolerance. :78-79.
Duggal HS, Cukier M, Sanders WH.  1997.  Probabilistic verification of a synchronous round-based consensus protocol. :165-174.

Pages