Publications
Export 7151 results:
Author Title [ Type] Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
1993. Local conditions for phase transitions in neural networks with variable connection strengths. Neural networks. 6(5):667-676.
2011. Local Balancing Influences Global Structure in Social Networks. Proceedings of the National Academy of SciencesPNAS. 108(5):1751-1752.
1992. Load balancing and routing on the hypercube and related networks. Journal of Parallel and Distributed Computing. 14(4):431-435.
2005. Listening to Maps: User Evaluation of Interactive Sonifications of Geo-Referenced Data (2004). Institute for Systems Research Technical Reports.
2005. Listening to Maps: User Evaluation of Interactive Sonifications of Geo-Referenced Data. Institute for Systems Research Technical Reports.
2010. Linking Software Development and Business Strategy Through Measurement. Computer. 43(4):57-65.
2005. Link-based classification. Advanced methods for knowledge discovery from complex data. :189-207.
2005. Link Mining for the Semantic Web, Position Statement. Proceedings of the Dagstuhl Seminar in Machine Learning for the Semantic Web.
1993. A linear-time model-checking algorithm for the alternation-free modal mu-calculus. Formal methods in system design. 2(2):121-147.
2011. Linear versus Mel Frequency Cepstral Coefficients for Speaker Recognition. IEEE Automatic Speech Recognition and Understanding Workshop.
2002. A Linear Iterative Approach for Hierarchical Shortest Path Finding. Technical Reports from UMIACS, UMIACS-TR-2002-97.
2001. Linear Fitting with Missing Data for Structure-from-Motion. Computer Vision and Image Understanding. 82(1):57-81.
1994. The linear algebra of block quasi-newton algorithms. Linear Algebra and its Applications. 212–213:153-168.
2011. Limits on the power of zero-knowledge proofs in cryptographic constructions. Theory of Cryptography. :559-578.
2005. The limits of speech recognition: Understanding acoustic memory and appreciating prosody (2000). Institute for Systems Research Technical Reports.
2011. Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
1990. Limited scope and circumscriptive reasoning. International Journal of Expert Systems. 3(3):207-217.
2011. Lightweight Graphical Models for Selectivity Estimation Without Independence Assumptions. Proceedings of the VLDB Endowment. 4(7)
1998. LifeLines: using visualization to enhance navigation and analysis of patient records. In Proceedings of the 1998 American Medical Informatic Association Annual Fall SymposiumProc AMIA Symp. :76-80.