Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Gordon D, Perlis D.  1989.  Explicitly biased generalization. Computational Intelligence. 5(2):67-81.
Morselli R, Bhattacharjee B, Katz J, Marsh M.  2007.  Exploiting approximate transitivity of trust. Broadband Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth International Conference on. :515-524.
Dorr BJ, Gaasterland T.  2007.  Exploiting aspectual features and connecting words for summarization-inspired temporal-relation extraction. Information Processing & Management. 43(6):1681-1704.
Raschid L, Sellis T, Lin CC.  2000.  Exploiting concurrency in a DBMS implementation for production systems. Proceedings of the first international symposium on Databases in parallel and distributed systems. :34-45.
Deshpande A, Guestrin C, Hong W, Madden S.  2005.  Exploiting Correlated Attributes in Acquisitional Query Processing. 21st International Conference on Data Engineering, 2005. ICDE 2005. Proceedings. :143-154.
Ryu K D, Hollingsworth J.  2000.  Exploiting fine-grained idle periods in networks of workstations. IEEE Transactions on Parallel and Distributed Systems. 11(7):683-698.
Andrade H, Kurc T, Sussman A, Saltz J.  2003.  Exploiting Functional Decomposition for Efficient Parallel Processing of Multiple Data Analysis Queries. Parallel and Distributed Processing Symposium, International. :81a-81a.
Angelopoulos N, Cussens J, De Raedt L, Dietterich T, Getoor L, Muggleton SH.  2006.  Exploiting independence for branch operations in Bayesian learning of C&RTs. Probabilistic, Logical and Relational Learning-Towards a Synthesis.
Lacroix Z, Moths T, Parekh K, Raschid L, Vidal M-E.  2004.  Exploiting multiple paths to express scientific queries. 16th International Conference on Scientific and Statistical Database Management, 2004. Proceedings. :357-360.
Lee WJ, Raschid L, Sayyadi H, Srinivasan P.  2008.  Exploiting ontology structure and patterns of annotation to mine significant associations between pairs of controlled vocabulary terms. Data Integration in the Life Sciences. :44-60.
Mishra A, Rozner E, Banerjee S, Arbaugh WA.  2005.  Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. :29-29.
Natarajan S, Tadepalli P, Fern A, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  Exploiting Prior Knowledge in Intelligent Assistants: Combining Relational Models with Hierarchies. Probabilistic, Logical and Relational Learning - A Further Synthesis.
Sen P, Deshpande A, Getoor L.  2008.  Exploiting shared correlations in probabilistic databases. Proceedings of the VLDB Endowment. 1(1):809-820.
Ye C, Ma ZS, Cannon CH, Pop M, Yu DW.  2012.  Exploiting sparseness in de novo genome assembly. BMC bioinformatics. 13(Suppl 6)
Gu R, Janneck JW, Raulet M, Bhattacharyya SS.  2011.  Exploiting Statically Schedulable Regions in Dataflow Programs. Journal of Signal Processing Systems. 63(1):129-142.
Getoor L, Mihalkova L.  2011.  Exploiting statistical and relational information on the web and in social media. Proceedings of the fourth ACM international conference on Web search and data mining. :9-10.
Tanin E, Shneiderman B.  2001.  Exploration of Large Online Data Tables Using Generalized Query Previews. University of Maryland Computer Science Technical Report (June 2001).
Jimmy Lin.  2007.  An exploration of the principles underlying redundancy-based factoid question answering. ACM Transactions on Information Systems. 25(2)
Herve J-Y, Aloimonos Y.  1992.  Exploratory active vision: theory. Proceedings of 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1992. :10-15.
Chimera R, Shneiderman B.  1994.  An exploratory evaluation of three interfaces for browsing large hierarchical tables of contents. ACM Trans. Inf. Syst.. 12(4):383-406.
Shneiderman B.  1976.  Exploratory experiments in programmer behavior. International Journal of Parallel Programming. 5(2):123-143.
Stevens P, Shneiderman B.  1981.  Exploratory research on training aids for naive users of interactive systems. Proceedings of the 44th ASIS Annual Meeting. 18:65-67.
Martin, M.P.  2003.  Exploratory studies of turbulence/chemistry interaction in hypersonic flows. 36 th AIAA Thermophysics Conference.
Wu Y, Oard D, Soboroff I.  2006.  An exploratory study of the W3C mailing list test collection for retrieval of emails with pro/con arguments. Proceedings of the Third Conference on Email and Anti-Spam, Mountain View, CA, July.
Tse T, Vegh S, Shneiderman B, Marchionini G.  1999.  An Exploratory Study of Video Browsing, User Interface Designs and Research Methodologies: Effectiveness in Information Seeking Tasks. PROCEEDINGS OF THE ANNUAL MEETING-AMERICAN SOCIETY FOR INFORMATION SCIENCE. 36:681-692.

Pages