Publications
Export 7151 results:
Author [ Title] Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2007. Exploiting approximate transitivity of trust. Broadband Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth International Conference on. :515-524.
2007. Exploiting aspectual features and connecting words for summarization-inspired temporal-relation extraction. Information Processing & Management. 43(6):1681-1704.
2000. Exploiting concurrency in a DBMS implementation for production systems. Proceedings of the first international symposium on Databases in parallel and distributed systems. :34-45.
2005. Exploiting Correlated Attributes in Acquisitional Query Processing. 21st International Conference on Data Engineering, 2005. ICDE 2005. Proceedings. :143-154.
2000. Exploiting fine-grained idle periods in networks of workstations. IEEE Transactions on Parallel and Distributed Systems. 11(7):683-698.
2003. Exploiting Functional Decomposition for Efficient Parallel Processing of Multiple Data Analysis Queries. Parallel and Distributed Processing Symposium, International. :81a-81a.
2006. Exploiting independence for branch operations in Bayesian learning of C&RTs. Probabilistic, Logical and Relational Learning-Towards a Synthesis.
2004. Exploiting multiple paths to express scientific queries. 16th International Conference on Scientific and Statistical Database Management, 2004. Proceedings. :357-360.
2008. Exploiting ontology structure and patterns of annotation to mine significant associations between pairs of controlled vocabulary terms. Data Integration in the Life Sciences. :44-60.
2005. Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. :29-29.
2008. Exploiting Prior Knowledge in Intelligent Assistants: Combining Relational Models with Hierarchies. Probabilistic, Logical and Relational Learning - A Further Synthesis.
2008. Exploiting shared correlations in probabilistic databases. Proceedings of the VLDB Endowment. 1(1):809-820.
2011. Exploiting Statically Schedulable Regions in Dataflow Programs. Journal of Signal Processing Systems. 63(1):129-142.
2011. Exploiting statistical and relational information on the web and in social media. Proceedings of the fourth ACM international conference on Web search and data mining. :9-10.
2001. Exploration of Large Online Data Tables Using Generalized Query Previews. University of Maryland Computer Science Technical Report (June 2001).
2007. An exploration of the principles underlying redundancy-based factoid question answering. ACM Transactions on Information Systems. 25(2)
1992. Exploratory active vision: theory. Proceedings of 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1992. :10-15.
1994. An exploratory evaluation of three interfaces for browsing large hierarchical tables of contents. ACM Trans. Inf. Syst.. 12(4):383-406.
1976. Exploratory experiments in programmer behavior. International Journal of Parallel Programming. 5(2):123-143.
1981. Exploratory research on training aids for naive users of interactive systems. Proceedings of the 44th ASIS Annual Meeting. 18:65-67.
2003. Exploratory studies of turbulence/chemistry interaction in hypersonic flows. 36 th AIAA Thermophysics Conference.
2006. An exploratory study of the W3C mailing list test collection for retrieval of emails with pro/con arguments. Proceedings of the Third Conference on Email and Anti-Spam, Mountain View, CA, July.
1999. An Exploratory Study of Video Browsing, User Interface Designs and Research Methodologies: Effectiveness in Information Seeking Tasks. PROCEEDINGS OF THE ANNUAL MEETING-AMERICAN SOCIETY FOR INFORMATION SCIENCE. 36:681-692.