Publications
Export 7151 results:
Author Title [ Type] Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2004. Model-Based Approaches-Validating Quality of Service for Reusable Software Via Model-Integrated Distributed Continuous Quality Assurance. Lecture Notes in Computer Science. 3107:286-295.
1996. Model theoretic approach to view updates in deductive databases. Journal of Automated Reasoning. 17(2):171-197.
2004. A model of BGP routing for network engineering. SIGMETRICS Perform. Eval. Rev.. 32(1):331-342.
1997. Model generation and state generation for disjunctive logic programs. The Journal of Logic Programming. 32(1):49-69.
1974. A model for optimizing indexed file structures. International Journal of Parallel Programming. 3(1):91-101.
2000. A model for magnetic aftereffect in the presence of time varying demagnetizing fields. Magnetics, IEEE Transactions on. 36(5):3182-3184.
2006. A model for computer frustration: the role of instrumental and dispositional factors on incident, session, and post-session frustration and mood. Computers in Human Behavior. 22(6):941-961.
2008. Model Driven Segmentation of Articulating Humans in Laplacian Eigenspace. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(10):1771-1785.
2007. Model and algorithms for point cloud construction using digital projection patterns. Journal of Computing and Information Science in Engineering. 7:372-372.
2010. A modality lexicon and its use in automatic tagging. Proceedings of the Seventh conference on International Language Resources and Evaluation (LREC’10). :1402-1407.
2012. Modality and Negation in SIMT Use of Modality and Negation in Semantically-Informed Syntactic MT. Computational Linguistics. :1-48.
2008. Mobile Retriever: Access to Digital Documents from their Physical Source. International Journal on Document Analysis and Recognition. 11(1):19-27.
2012. Mobile Data Offloading through Opportunistic Communications and Social Participation. Mobile Computing, IEEE Transactions on. 11(5):821-834.
2010. Mobile data offloading in metropolitan area networks. SIGMOBILE Mob. Comput. Commun. Rev.. 14(4):28-30.
2003. MobiCom poster: mining a world of smart sensors. SIGMOBILE Mob. Comput. Commun. Rev.. 7(1):34-36.
2007. Mixed-state models for nonstationary multiobject activities. EURASIP J. Appl. Signal Process.. 2007(1):106-106.
2008. Mixed state models for automatic target recognition and behavior analysis in video sequences. Proceedings of SPIE. 6967(1):69670Q-69670Q-11-69670Q-69670Q-11.
1994. Mission-oriented replication of periodic tasks in real-time distributed systems. Computer Science Technical Report Series; Vol. CS-TR-3256. :24-24.
2005. Mirror symmetric topographic maps can arise from activity-dependent synaptic changes. Neural computation. 17(5):1059-1083.
2004. Mining tool for surveillance video. SPIE 16th International Symposium on Electronic Imaging, Storage and Retrieval Methods and Applications for Multimedia. 5307:259-270.
1995. A miniaturized space-variant active vision system: Cortex-I. Machine Vision and applications. 8(2):101-109.
1994. A miniature pan-tilt actuator: the spherical pointing motor. IEEE Transactions on Robotics and Automation. 10(3):298-308.