Publications
Export 7151 results:
Author [ Title] Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
1997. On the Perturbation of LU and Cholesky Factors. IMA Journal of Numerical AnalysisIMA J Numer Anal. 17(1):1-6.
1997. Perturbation of eigenvalues of preconditioned Navier-Stokes operators. SIAM Journal on Matrix Analysis and Applications. 18(3):733-751.
2003. A perturbation method for evaluating background subtraction algorithms. Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (VS-PETS).
1997. Perturbation analysis for the QR decomposition. SIAM Journal on Matrix Analysis and Applications. 18:775-791.
2008. Persuading Visual Attention through Geometry. Visualization and Computer Graphics, IEEE Transactions on. 14(4):772-782.
1999. Perspective-based Usability Inspection: An Empirical Validation of Efficacy. Empirical Software Engineering. 4(1):43-69.
1997. A perspective on word sense disambiguation methods and their evaluation. Proceedings of the ACL SIGLEX workshop on tagging text with lexical semantics: Why, what, and how. 86
1978. Personality and programming: Time-sharing vs. batch preference. Proceedings of the 1978 annual conference - Volume 2. :561-569.
2013. Personal informatics in the wild: hacking habits for health & happiness. CHI '13 Extended Abstracts on Human Factors in Computing Systems. :3179-3182.
2009. Persona : An Online Social Network with User-Defined Privacy Categories and Subject Descriptors. Computer. 39(4):135-146.
2009. Persona: an online social network with user-defined privacy. Proceedings of the ACM SIGCOMM 2009 conference on Data communication. :135-146.
2002. Persistent caching in a multiple query optimization framework. Proceedings of the 6th Workshop on Languages, Compilers, and Run-Time Systems for Scalable Computers.
2003. Persistence of adhesive properties in Vibrio cholerae after long‐term exposure to sea water. Environmental Microbiology. 5(10):850-858.
2005. Performance study on multimedia fingerprinting employing traceability codes. Digital Watermarking. :84-96.
2004. Performance study of ECC-based collusion-resistant multimedia fingerprinting. Proceedings of the 38th CISS. :827-832.
2001. Performance optimization for data intensive grid applications. Active Middleware Services, 2001. Third Annual International Workshop on. :97-105.
2003. Performance of detection statistics under collusion attacks on independent multimedia fingerprints. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 1:I-205-8vol.1-I-205-8vol.1.
2003. Performance of a Three-Stage System for Multi-Document Summarization. DUC 03 Conference ProceedingsDUC 03 Conference Proceedings.