Publications
Export 7151 results:
Author [ Title] Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
2004. The priority curve algorithm for video summarization. Proceedings of the 2nd ACM international workshop on Multimedia databases. :28-35.
2009. Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. Security Privacy, IEEE. 7(1):42-48.
2009. Prioritizing component compatibility tests via user preferences. Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. :29-38.
1996. Priorities for modeling and verifying distributed systems. Tools and Algorithms for the Construction and Analysis of Systems. :278-297.
1994. Principles of computer vision. Handbook of pattern recognition and image processing (vol. 2). :1-15.
2007. Principles for designing data-/compute-intensive distributed applications and middleware systems for heterogeneous environments. Journal of Parallel and Distributed Computing. 67(7):755-771.
1986. Principles and techniques in the design of ADMS+((advanced data-base management system)). Computer. 19:19-23.
2006. Principal components null space analysis for image and video classification. Image Processing, IEEE Transactions on. 15(7):1816-1830.
2013. Primate Transcript and Protein Expression Levels Evolve Under Compensatory Selection Pressures. Science. 342(6162):1100-1104.
1994. A primal-dual parallel approximation technique applied to weighted set and vertex covers. Journal Algorithms. 17(2):280-289.
2010. The pre‐seventh pandemic Vibrio cholerae BX 330286 El Tor genome: evidence for the environment as a genome reservoir. Environmental Microbiology Reports. 2(1):208-216.
2000. Previews and overviews in digital libraries: Designing surrogates to support visual information seeking. Journal of the American Society for Information Science. 51(4):380-393.
2008. Preserving the privacy of sensitive relationships in graph data. Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. :153-171.
2004. Preserving distributed systems critical properties: a model-driven approach. Software, IEEE. 21(6):32-40.
2003. Preserving Context with Zoomable User Interfaces. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :83-83.
1993. Presentations and this and that: logic in action. Proceedings of the 15th Annual Conference of the Cognitive Science Society, Boulder, Colorado. 251
2002. Presentation planning for distributed VoD systems. Knowledge and Data Engineering, IEEE Transactions on. 14(5):1059-1077.