Publications
Export 7148 results:
[ Author] Title Type Year Filters: Efficient-cryptographic-protocols-preventing-%E2%80%9Cman-middle%E2%80%9D-attacks is [Clear All Filters]
1985. Learning a menu selection tree: training methods compared. Behaviour & Information Technology. 4(2):81-91.
2007. EcoLens: Integration and interactive visualization of ecological datasets. Ecological Informatics. 2(1):61-69.
2006. Overconfidence or paranoia? search in imperfect-information games PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE. 21:1045-1045.
2009. SPOT Databases: Efficient Consistency Checking and Optimistic Selection in Probabilistic Spatial Databases. Knowledge and Data Engineering, IEEE Transactions on. 21(1):92-107.
2007. Probabilistic go theories.
2008. An AGM-based belief revision mechanism for probabilistic spatio-temporal logics. Proceedings of the 23rd national conference on Artificial intelligence. :511-516.
2010. Portfolio Selection Using Tikhonov Filtering to Estimate the Covariance Matrix. SIAM Journal on Financial Mathematics. 1:932-961.
2006. Target size study for one-handed thumb use on small touchscreen devices. Proceedings of the 8th conference on Human-computer interaction with mobile devices and services. :203-210.
2005. Human action-recognition using mutual invariants. Computer Vision and Image Understanding. 98(2):294-324.
2002. Quasi-invariants for human action representation and recognition. Pattern Recognition, 2002. Proceedings. 16th International Conference on. 1:307-310vol.1-307-310vol.1.
2006. View Invariance for Human Action Recognition. International Journal of Computer Vision. 66(1):83-101.
2004. View independent human body pose estimation from a single perspective image. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 2:II-16-II-22Vol.2-II-16-II-22Vol.2.
2008. Towards Design and Fabrication of a Miniature MRI-Compatible Robot for Applications in Neurosurgery. :747-754.
2008. Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
2008. Worst case examples of an exterior point algorithm for the assignment problem. Discrete Optimization. 5(3):605-614.
2003. A Visualization of the Primal Simplex Algorithm for the Assignment Problem. ITiCSE '03 Proceedings of the 8th Annual Conference on Innovation and Technology in Computer Science Education . :267-267.
2008. Algorithms for Location Estimation Based on RSSI Sampling. Algorithmic Aspects of Wireless Sensor Networks. :72-86.
2006. Applications of Parameterized st-Orientations in Graph Drawing Algorithms. Graph Drawing. :355-367.