Publications
Export 7148 results:
[ Author] Title Type Year Filters: Robotson-crusoe%E2%80%93or%E2%80%93what-common-sense is [Clear All Filters]
2005. Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
2007. Nonintrusive component forensics of visual sensors using output images. Information Forensics and Security, IEEE Transactions on. 2(1):91-106.
2006. Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
2011. Lightweight monadic programming in ML. Proceedings of the 16th ACM SIGPLAN international conference on Functional programming. :15-27.
2008. Verified enforcement of automaton-based information release policies. Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security. ACM Press.
2006. Managing policy updates in security-typed languages. 19th IEEE Computer Security Foundations Workshop, 2006. :13pp.-216-13pp.-216.
2008. Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
2009. A theory of typed coercions and its applications. Proceedings of the 14th ACM SIGPLAN international conference on Functional programming. :329-340.
2007. Verified Enforcement of Security Policies for Cross-Domain Information Flows. IEEE Military Communications Conference, 2007. MILCOM 2007. :1-7.
1983. The effect of scope delimiters on program comprehension. Software: Practice and Experience. 13(9):817-824.
2005. Differentiated traffic engineering for QoS provisioning. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 4:2349-2359vol.4-2349-2359vol.4.
2007. Robust Routing with Unknown Traffic Matrices. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. :2436-2440.
2007. Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
2005. Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
1995. A large-scale neural model linking local neuronal dynamics to positron emission tomography (PET) regional cerebral blood ffow (rCBF) data. Soc Neurosci Abstr. 21:1988-1988.
1989. A data flow implementation of a competition-based connectionist model* 1. Journal of Parallel and Distributed Computing. 6(3):704-714.
2011. Towards view-invariant expression analysis using analytic shape manifolds. 2011 IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011). :306-313.
2008. High-Dimensional Similarity Retrieval Using Dimensional Choice. Similarity Search and Applications, 2008. SISAP 2008. First International Workshop on. :35-42.
2006. Using image similarity and asymmetry to detect breast cancer. Proc. of SPIE Vol. 6144:61441S–1-61441S–1.
2006. Archimedes, an archive of medical images. American Medical Informatics Association 2006 Annual Symposium Proceedings Biomedical and Health Informatics: From Foundations to Applications to Policy, Washington, DC, DW Bates, JH Holmes, and G. Kuperman, editors.
2007. An improved asymmetry measure to detect breast cancer. Proceedings of SPIE. 6514(1):65141Q-65141Q-9-65141Q-65141Q-9.