Publications
Export 7151 results:
Author Title Type [ Year] Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2008. Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
2008. VAST 2008 Challenge: Introducing mini-challenges. Visual Analytics Science and Technology, 2008. VAST '08. IEEE Symposium on. :195-196.
2008. VCode - Pervasive Data Transfer Using Video Barcode. IEEETransactions on Multimedia. 10(3):361-371.
2008. Verified enforcement of automaton-based information release policies. Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security. ACM Press.
2008. Vibrio cholerae non‐O1, non‐O139 strains isolated before 1992 from Varanasi, India are multiple drug resistant, contain intSXT, dfr18 and aadA5 genes. Environmental Microbiology. 10(4):866-873.
2008. Virtual access points for vehicular networks. Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications. :14-14.
2008. Visualizing Functional Data with an Application to eBay’s Online Auctions. Handbook of Data VisualizationHandbook of Data Visualization. :873-898.
2008. A Weighted GCV Method for Lanczos Hybrid Regularization. Electronic Transactions on Numerical Analysis. 28:149-167.
2008. Who killed the directed model? Computer Vision and Pattern Recognition, IEEE Computer Society Conference on. :1-8.
2008. Why Do Hubs in the Yeast Protein Interaction Network Tend To Be Essential: Reexamining the Connection between the Network Topology and Essentiality. PLoS Comput BiolPLoS Comput Biol. 4(8):e1000140-e1000140.
2008. Worst case examples of an exterior point algorithm for the assignment problem. Discrete Optimization. 5(3):605-614.
2007. 25 years of CHI conferences: capturing the exchange of ideas. Magazine interactions - 25 years of CHI conferences: a photographic essay. 14(2):24-31.
2007. Accountability as a service. Proceedings of the 3rd USENIX workshop on Steps to reducing unwanted traffic on the internet. :5:1–5:6-5:1–5:6.
2007. ACE: A Novel Software Platform to Ensure the Integrity of Long Term Archives. UMIACS-TR-2007-07
2007. On achieving the "best of both worlds" in secure multiparty computation. Proceedings of the thirty-ninth annual ACM symposium on Theory of computing. :11-20.
2007. Active semantic caching to optimize multidimensional data analysis in parallel and distributed environments. Parallel Computing. 33(7-8):497-520.
2007. Adaptive Detection for Group-Based Multimedia Fingerprinting. Signal Processing Letters, IEEE. 14(12):964-967.
2007. An adaptive mean shift tracking method using multiscale images. Wavelet Analysis and Pattern Recognition, 2007. ICWAPR '07. International Conference on. 3:1060-1066.
2007. Adaptive query processing: why, how, when, what next? Proceedings of the 33rd international conference on Very large data bases. :1426-1427.