Publications
Export 7151 results:
Author [ Title] Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2003. Exemplar-based tracking and recognition of arm gestures. Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the 3rd International Symposium on. 2:656-661Vol.2-656-661Vol.2.
2006. Existential Label Flow Inference Via CFL Reachability. Static AnalysisStatic Analysis. 4134:88-106.
2002. Expandable indexes vs. sequential menus for searching hierarchies on the World Wide Web. Behaviour & Information Technology. 21(3):201-207.
2008. Expanding the reach of Grid computing: combining Globus- and BOINC-based systems. Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology. :71-85.
2006. On expected constant-round protocols for Byzantine agreement. Advances in Cryptology-CRYPTO 2006. :445-462.
2009. On expected constant-round protocols for Byzantine agreement. Journal of Computer and System Sciences. 75(2):91-112.
2001. An experience management system for a software engineering research organization. Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard. :29-35.
2004. Experience with safe manual memory-management in cyclone. Proceedings of the 4th international symposium on Memory management. :73-84.
2008. Experiences with building an intrusion-tolerant group communication system. Software: Practice and Experience. 38(6):639-666.
2002. Experiences with capsule-based active networking. DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :16-24.
1994. Experiences with Constraint-based Array Dependence Analysis. Principles and practice of constraint programming: second international workshop, PPCP'94, Rosario, Orcas Island, WA, USA, May 2-4, 1994: proceedings. :312-312.
1994. An experiment to assess different defect detection methods for software requirements inspections. Proceedings of the 16th international conference on Software engineering. :103-112.
1997. An experiment to assess the cost-benefits of code inspections in large scale software development. IEEE Transactions on Software Engineering. 23(6):329-346.
1980. An experiment using memorization/reconstruction as a measure of programmer ability. International Journal of Man-Machine Studies. 13(3):339-354.
2001. Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry. Algorithm EngineeringAlgorithm Engineering. 2141:172-184.
1986. An experimental comparison of a mouse and arrow-jump keys for an interactive encyclopedia. International Journal of Man-Machine Studies. 24(1):29-45.
1984. An experimental comparison of tabular and graphic data presentation. International Journal of Man-Machine Studies. 20(6):545-566.
2002. Experimental Construction of Very Large Scale DNA Databases with Associative Search. DNA computing: 7th International Workshop on DNA-Based Computers, DNA 7, Tampa, FL, USA, June 10-13, 2001: revised papers. 7:231-231.
2003. An experimental evaluation of correlated network partitions in the Coda distributed file system. :273-282.
2002. An experimental evaluation of linear and kernel-based methods for face recognition. Applications of Computer Vision, 2002. (WACV 2002). Proceedings. Sixth IEEE Workshop on. :13-18.
2002. Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. Dependable Computing EDCC-4. 2485:644-648.
1989. An experimental evaluation of three touch screen strategies within a hypertext database. International Journal of Human-Computer Interaction. 1(1):41-52.