Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
Filters: Structure-distribution-and-evolution-%C4%B1t-ta1-retrotransposable-element-family-%C4%B1t is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Shin C, Doermann D.  1999.  Classification of Document Page Images. SDIUT99. :166-175.
Shin M, Arbaugh WA.  2009.  Efficient peer-to-Peer lookup in multi-hop wireless networks. KSII Trans. Internet and Information Systems. 3(1):5-25.
Shiloach Y, Vishkin U.  1982.  An O (logn) parallel connectivity algorithm. Journal of Algorithms. 3(1):57-67.
Shiloach Y, Vishkin U.  1982.  An O (n2log n) parallel max-flow algorithm. Journal of Algorithms. 3(2):128-146.
Shiloach Y, Vishkin U.  1981.  Finding the maximum, merging, and sorting in a parallel computation model. Journal of Algorithms. 2(1):88-102.
Shiloach Y, Vishkin U, An O.  1982.  parallel MAX-FLOW algorithm. Journal of Algorithms. 3:128-146.
Shih YT, Elman H.  2000.  Iterative methods for stabilized discrete convection-diffusion problems. IMA journal of numerical analysis. 20(3):333-333.
Shih Y-T, Elman H.  1999.  Modified streamline diffusion schemes for convection-diffusion problems. Computer Methods in Applied Mechanics and Engineering. 174(1-2):137-151.
Shi Q, JaJa JF.  2005.  Optimal and near-optimal algorithms for generalized intersection reporting on pointer machines. Information Processing Letters. 95(3):382-388.
Shi Q, JaJa JF.  2003.  Fast Algorithms for 3-D Dominance Reporting and Counting. UMIACS-TR-2003-06
Shi Q, JaJa JF.  2005.  A new framework for addressing temporal range queries and some preliminary results. Theoretical Computer Science. 332(1–3):109-121.
Elaine Shi.  2008.  Evaluating predicates over encrypted data.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Shi E, Stefanov E, Papamanthou C.  2013.  Practical Dynamic Proofs of Retrievability. CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . :325-336.
Shi Q, JaJa JF.  2006.  Efficient Isosurface Extraction for Large Scale Time-Varying Data Using the Persistent Hyperoctree (PHOT). UMIACS-TR-2006-01
Elaine Shi, Lu Y, Reid M.  2005.  Recovering from Intrusions in the OSPF Data-plane. Selected Project Reports, Spring 2005 Advanced OS & Distributed Systems (15-712).
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
Shi Q, JaJa JF, Mortensen C.  2003.  Space-Efficient and Fast Algorithms for Multidimensional Dominance Reporting and Range Counting. UMIACS-TR-2003-101
Elaine Shi, Chan T, Rieffel E, Chow R, Song D.  2011.  Privacy-preserving aggregation of time-series data. 17
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Shi Q, JaJa JF.  2003.  An O(n)-Space O(log n/log log n + f)-Query Time Algorithm for 3-D Dominance Reporting. UMIACS-TR-2003-77
Elaine Shi, Stoica I, Andersen DG, Perrig A.  2006.  OverDoSe: A generic DDoS protection service using an overlay network.
Shi Q, JaJa JF.  2002.  Efficient techniques for range search queries on earth science data. Scientific and Statistical Database Management, 2002. Proceedings. 14th International Conference on. :142-151.
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.

Pages