Publications
Export 7151 results:
Author [ Title] Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
1999. On the evolution of reactive components: A process-algebraic approach. Lecture notes in computer science. :161-175.
2010. Evolution of state-dependent risk preferences. ACM Transactions on Intelligent Systems and Technology (TIST). 1(1):6:1–6:21-6:1–6:21.
2011. The evolution of stochastic grammars for representation and recognition of activities in videos. 2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops). :688-688.
2006. The evolution of the international children's digital library searching and browsing interface. Proceedings of the 2006 conference on Interaction design and children. :105-112.
1996. Evolutionary biology of parasitic platyhelminths: The role of molecular phylogenetics. Parasitol Today. 12(2):66-71.
2006. Evolutionary design of neural network architectures using a descriptive encoding language. Evolutionary Computation, IEEE Transactions on. 10(6):676-688.
2005. Evolutionary discovery of arbitrary self-replicating structures. Computational Science–ICCS 2005. :404-411.
2010. Evolutionary dynamics of U12-type spliceosomal introns. BMC Evolutionary Biology. 10(1):47-47.
2010. Evolutionary framework for Lepidoptera model systems. Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera. :1-24.
2005. An evolutionary testbed for software technology evaluation. Innovations in Systems and Software Engineering. 1(1):3-11.
2005. Evolving and packaging reading technologies. Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili. 1:362-362.
2001. Evolving columnar circuitry for lateral cortical inhibition. Neural Networks, 2001. Proceedings. IJCNN'01. International Joint Conference on. 1:278-283.
2005. Evolving processing speed asymmetries and hemispheric interactions in a neural network model. Neurocomputing. 65:47-53.
2010. Evolving viral marketing strategies. Proceedings of the 12th annual conference on Genetic and evolutionary computation. :1195-1202.
2005. EvoSTOC Contributions. Applications of evolutionary computing: EvoWorkshops 2005, EvoBIO, EvoCOMNET, EvoHOT, EvoIASP, EvoMUSART, and EvoSTOC.
1999. Exact solutions for the problem of source location from measured time differences of arrival. The Journal of the Acoustical Society of America. 106:2277-2277.
1990. Examining usability for a training-oriented hypertext: Can hyper-activity be good? Electronic Publishing. 3(4):207-225.
2011. Example-Driven Manifold Priors for Image Deconvolution. Image Processing, IEEE Transactions on. 20(11):3086-3096.
1999. Excentric labeling: dynamic neighborhood labeling for data visualization. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :512-519.
2005. Executable requirements specifications using triggered message sequence charts. Distributed Computing and Internet Technology. :482-493.
2008. Executable Specifications for Real-Time Distributed Systems. Electronic Notes in Theoretical Computer Science. 203(4):3-17.
2007. Execution time analysis of a top-down R-tree construction algorithm. Information Processing Letters. 101(1):6-12.