Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is   [Clear All Filters]
Conference Papers
Kraus S, V.S. Subrahmanian, Tas NC.  2003.  Probabilistically survivable mass. INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE. 18:789-795.
Rand W, Riolo R.  2005.  The problem with a self-adaptative mutation rate in some environments: a case study using the shaky ladder hyperplane-defined functions. Proceedings of the 2005 conference on Genetic and evolutionary computation. :1493-1500.
Doermann D, Rosenfeld A.  1993.  The processing of form documents. Document Analysis and Recognition, 1993., Proceedings of the Second International Conference on. :497-501.
Kang H-J, Doermann D.  2004.  Product approximation by minimizing the upper bound of Bayes error rate for Bayesian combination of classifiers. Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on. 1:252-255Vol.1-252-255Vol.1.
Ramsbrock D, Berthier R, Cukier M.  2007.  Profiling Attacker Behavior Following SSH Compromises. :119-124.
Yeh RT, Mittermeir R, Roussopoulos N, Reed J.  1984.  A Programming Environment Framework Based on Reusability. Proceedings of the First International Conference on Data Engineering. :277-280.
Marchionini G, Haas S, Shneiderman B, Plaisant C, Hert CA.  2004.  Project highlight: toward the statistical knowledge network. Proceedings of the 2004 annual national conference on Digital government research. :125:1–125:2-125:1–125:2.
Xu Y, Ji H, Fermüller C.  2006.  A Projective Invariant for Textures. 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2:1932-1939.
Shneiderman B, Churchill E, Fischer G, Goldberg K.  2009.  Promoting social creativity: a component of a national initiative for social participation. Proceedings of the seventh ACM conference on Creativity and cognition. :7-8.
Reggia JA.  1987.  Properties of a competition-based activation mechanism in neuromimetic network models. Proceedings of the First International Conference on Neural Networks.
Minker J, Perlis D.  1984.  Protected circumscription. Proc. Workshop on Non-Monotonic Reasoning. :337-343.
Sabnis C, Cukier M, Ren J, Rubel P, Sanders WH, Bakken DE, Karr D.  1999.  Proteus: a flexible infrastructure to implement adaptive fault tolerance in AQuA. :149-168.
Mendonça Neto MG, Seaman C, Basili VR, Kim YM.  2001.  A prototype experience management system for a software consulting organization. Thirteenth International Conference on Software Engineering and Knowledge Engineering. :29-36.
Dumitras T, Efstathopoulos P..  2012.  The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
Jajodia S, Kudo M, V.S. Subrahmanian.  2001.  Provisional authorizations. E-commerce Security and Privacy. 2:133-159.
Weiss K, De Floriani L, Fellegara R, Velloso M.  2011.  The PR-star octree: a spatio-topological data structure for tetrahedral meshes. Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. :92-101.
Aloimonos Y.  1990.  Purposive and qualitative active vision. Proceedings of 10th International Conference on Pattern Recognition, 1990. i:346-360vol.1-346-360vol.1.
Boyd-Graber J, Blei D.  2007.  PUTOP: turning predominant senses into a topic model for word sense disambiguation. Proceedings of the 4th International Workshop on Semantic Evaluations. :277-281.
Shneiderman B.  1981.  Putting the human factor into systems development. Proceedings of the eighteenth annual computer personnel research conference. :1-13.
Jimmy Lin, Madnani N, Dorr BJ.  2010.  Putting the user in the loop: interactive Maximal Marginal Relevance for query-focused summarization. Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :305-308.
Hung E, Getoor L, V.S. Subrahmanian.  2003.  PXML: a probabilistic semistructured data model and algebra. Data Engineering, 2003. Proceedings. 19th International Conference on. :467-478.
Shulman D, Fermüller C.  1996.  Qualitative depth and FOE information via smoothed flow. Proceedings of the 20th workshop of the Austrian Association for Pattern Recognition (OAGM/AAPR) on Pattern recognition 1996. :207-213.
Ramasamy HV, Pandey P, Lyons J, Cukier M, Sanders WH.  2002.  Quantifying the cost of providing intrusion tolerance in group communication systems. :229-238.
Parameswaran V, Chellappa R.  2002.  Quasi-invariants for human action representation and recognition. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 1:307-310vol.1-307-310vol.1.
Zhang K, Andrade H, Raschid L, Sussman A.  2005.  Query planning for the grid: adapting to dynamic resource availability. Cluster Computing and the Grid, IEEE International Symposium on. 2:751-758.

Pages