Publications
Export 7151 results:
Author [ Title] Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2006. Open problems in relational data clustering. Proceedings of the ICML Workshop on Open Problems in Stastistical Relational Learning.
2010. Ontuition: intuitive data exploration via ontology navigation. Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. :540-541.
2008. An ontology based approach for activity recognition from video. Proceedings of the 16th ACM international conference on Multimedia. :709-712.
2007. Ontologies for reasoning about failures in AI systems. Proceedings from the Workshop on Metareasoning in Agent Based Systems at the Sixth International Joint Conference on Autonomous Agents and Multiagent Sytems.
2003. An O(n)-Space O(log n/log log n + f)-Query Time Algorithm for 3-D Dominance Reporting. UMIACS-TR-2003-77
2004. Only in Europe?: The Economic and Military Foundations of European World Empires Typescript. Princeton University.
2013. Online Latent Dirichlet Allocation with Infinite Vocabulary. International Conference on Machine Learning. 2013_icml_infvoc.pdf (985.1 KB)
2008. Online Filtering, Smoothing and Probabilistic Modeling of Streaming data. IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008. :1160-1169.
2010. Online Empirical Evaluation of Tracking Algorithms. IEEE Transactions on Pattern Analysis and Machine Intelligence. 32(8):1443-1458.
2005. On-line density-based appearance modeling for object tracking. Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. 2:1492-1499Vol.2-1492-1499Vol.2.
1996. An online computation of critical path profiling. Proceedings of the SIGMETRICS symposium on Parallel and distributed tools. :11-20.
2007. Online collective entity resolution. PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE. 22(2):1606-1606.
2005. Online auctions with re-usable goods. Proceedings of the 6th ACM conference on Electronic commerce. :165-174.
2009. Online allocation of display advertisements subject to advanced sales contracts. Proceedings of the Third International Workshop on Data Mining and Audience Intelligence for Advertising. :69-77.
2006. A One-Threshold Algorithm for Detecting Abandoned Packages Under Severe Occlusions Using a Single Camera. Technical Reports from UMIACS.
2004. One-round protocols for two-party authenticated key exchange. Applied Cryptography and Network Security. :220-232.
2001. The one-inclusion graph algorithm is near-optimal for the prediction model of learning. IEEE Transactions on Information Theory. 47(3):1257-1261.
2008. One-handed touchscreen input for legacy applications. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1399-1408.