Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
Filters: Robotson-crusoe%E2%80%93or%E2%80%93what-common-sense is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Shi Q, JaJa JF, Mortensen C.  2003.  Space-Efficient and Fast Algorithms for Multidimensional Dominance Reporting and Range Counting. UMIACS-TR-2003-101
Elaine Shi, Chan T, Rieffel E, Chow R, Song D.  2011.  Privacy-preserving aggregation of time-series data. 17
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Shi Q, JaJa JF.  2003.  An O(n)-Space O(log n/log log n + f)-Query Time Algorithm for 3-D Dominance Reporting. UMIACS-TR-2003-77
Elaine Shi, Stoica I, Andersen DG, Perrig A.  2006.  OverDoSe: A generic DDoS protection service using an overlay network.
Shi Q, JaJa JF.  2002.  Efficient techniques for range search queries on earth science data. Scientific and Statistical Database Management, 2002. Proceedings. 14th International Conference on. :142-151.
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.
Shi Q, JaJa JF.  2006.  Isosurface Extraction and Spatial Filtering using Persistent Octree (POT). Visualization and Computer Graphics, IEEE Transactions on. 12(5):1283-1290.
Shi Q, JaJa JF.  2005.  Techniques for indexing and querying temporal observations for a collection of objects. Algorithms and Computation. :822-834.
Shi Q, JaJa JF.  2003.  Fast algorithms for a class of temporal range queries. Algorithms and Data Structures. :91-102.
Elaine Shi, Bethencourt J, Chan T-HH, Song D, Perrig A.  2007.  Multi-Dimensional Range Query over Encrypted Data. :350-364.
Elaine Shi, Perrig A.  2004.  Designing secure sensor networks. Wireless Communications, IEEE. 11(6):38-43.
Shi Q, JaJa JF.  2005.  Novel transformation techniques using q-heaps with applications to computational geometry. SIAM Journal on Computing. 34(6):1474-1492.
Shi Q, JaJa JF.  2003.  Fast Fractional Cascading and Its Applications. UMIACS-TR-2003-71
Shih YT, Elman H.  2000.  Iterative methods for stabilized discrete convection-diffusion problems. IMA journal of numerical analysis. 20(3):333-333.
Shih Y-T, Elman H.  1999.  Modified streamline diffusion schemes for convection-diffusion problems. Computer Methods in Applied Mechanics and Engineering. 174(1-2):137-151.
Shiloach Y, Vishkin U.  1982.  An O (logn) parallel connectivity algorithm. Journal of Algorithms. 3(1):57-67.
Shiloach Y, Vishkin U.  1982.  An O (n2log n) parallel max-flow algorithm. Journal of Algorithms. 3(2):128-146.
Shiloach Y, Vishkin U.  1981.  Finding the maximum, merging, and sorting in a parallel computation model. Journal of Algorithms. 2(1):88-102.
Shiloach Y, Vishkin U, An O.  1982.  parallel MAX-FLOW algorithm. Journal of Algorithms. 3:128-146.
Shin C, Doermann D, Rosenfeld A.  2003.  Measuring Structural Similarity of Document Pages for Searching Document Image Databases. 5th IASTEDInternational Conference on Signal and Image Processing. :320-325.
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Shin C, Doermann D.  1999.  Classification of Document Page Images. SDIUT99. :166-175.
Shin M, Arbaugh WA.  2009.  Efficient peer-to-Peer lookup in multi-hop wireless networks. KSII Trans. Internet and Information Systems. 3(1):5-25.
Shirdhonkar S, Jacobs DW.  2008.  Approximate earth mover's distance in linear time. Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on. :1-8.

Pages