Journal Articles

Pages

Huang Y, Evans D, Katz J. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? 19th Network and Distributed Security Symposium. 2011.
Mishra A, Shin M, Petroni NL, Clancy TC, Arbaugh WA. Proactive key distribution using neighbor graphs. IEEE Wireless Communications. 2004;11(1):26-36.
Sharma R, Mount D, Aloimonos Y. Probabilistic analysis of some navigation strategies in a dynamic environment. Systems, Man and Cybernetics, IEEE Transactions on. 1993;23(5):1465-1474.
Hua S, Qu G, Bhattacharyya SS. Probabilistic design of multimedia embedded systems. ACM Transactions on Embedded Computing Systems (TECS). 2007;6(3):15–es - 15–es.
Han B, Davis LS. Probabilistic fusion-based parameter estimation for visual tracking. Computer Vision and Image Understanding. 2009;113(4):435-445.
Gupta A, Kembhavi A, Davis LS. Probabilistic graphical models. IEEE transactions on pattern analysis and machine intelligence. 2009;31(10):1775-1789.
Stark E, Cleaveland R, Smolka S. Probabilistic I/O automata: Theories of two equivalences. CONCUR 2006–Concurrency Theory. 2006:343-357.
Hung E, Getoor L, V.S. Subrahmanian. Probabilistic interval XML. ACM Transactions on Computational Logic (TOCL). 2007;8(4).
Getoor L, Segal E, Taskar B, Koller D. Probabilistic models of text and link structure for hypertext classification. IJCAI workshop on text learning: beyond supervision. 2001:24-29.
Eiter T, Lu JJ, Lukasiewicz T, V.S. Subrahmanian. Probabilistic object bases. ACM Trans. Database Syst.. 2001;26(3):264-312.
Zhou S, Krueger V, Chellappa R. Probabilistic recognition of human faces from video. Computer Vision and Image Understanding. 2003;91(1–2):214-245.
Philippou A, Cleaveland R, Lee I, Smolka S, Sokolsky O. Probabilistic resource failure in real-time process algebra. CONCUR'98 Concurrency Theory. 1998:465-472.
Bröcheler M, Mihalkova L, Getoor L. Probabilistic similarity logic. Proceedings of the Conference on Uncertainty in Artificial Intelligence. 2010.
Alex D, Robert R, V.S. Subrahmanian. Probabilistic temporal databases. ACM Transaction on Database Systems. 2001;26(1):41-95.
Dekhtyar A, Ross R, V.S. Subrahmanian. Probabilistic temporal databases, I: algebra. ACM Trans. Database Syst.. 2001;26(1):41-95.
Dekhtyar A, Ozcan F, Ross R, V.S. Subrahmanian. Probabilistic Temporal Databases, II: Calculus and Query Processing. Technical Reports from UMIACS, UMIACS-TR-2001-79. 2001.
Cleaveland R, Iyer PS, Narasimha M. Probabilistic temporal logics via the modal mu-calculus. Theoretical Computer Science. 2005;342(2-3):316-350.
De Raedt L, Dietterich T, Getoor L, Muggleton SH, Lloyd JW, Sears TD, et al. Probabilistic, Logical and Relational Learning-Towards a Synthesis. Dagstuhl Seminar Proceedings. 2006;5051.
Beynon M, Chang C, Catalyurek U, Kurc T, Sussman A, Andrade H, et al. Processing large-scale multi-dimensional data in parallel and distributed environments. Parallel Computing. 2002;28(5):827-859.
Yegnanarayana B, Prasanna SR, Duraiswami R, Zotkin DN. Processing of reverberant speech for time-delay estimation. IEEE Transactions on Speech and Audio Processing. 2005;13(6):1110-1118.
Chang YH, Raschid L. Producing Interoperable Queries for Relational and Object-Oriented Databases. Journal of Intelligent Information Systems. 2000;14(1):51-75.
Miara RJ, Musselman JA, Navarro JA, Shneiderman B. Program indentation and comprehensibility. Communications of the ACM. 1983;26(11):861-867.
Cable JH, Ordonez JF, Chintalapani G, Plaisant C. Project portfolio earned value management using treemaps. Proceedings of the Project Management Institute Research Conference. 2004.
Basri R, Jacobs DW. Projective alignment with regions. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 2001;23(5):519-527.
Roitman H, Gal A, Raschid L. ProMo-A Scalable and Efficient Framework for Online Data Delivery. Lecture notes in computer science. 2006;4032:359.
Ouhammouch M, Langham GE, Hausner W, Simpson AJ, El-Sayed NM, Geiduschek PE. Promoter architecture and response to a positive regulator of archaeal transcription. Molecular Microbiology. 2005;56(3):625-637.
Hannenhalli S, Levy S. Promoter prediction in the human genome. Bioinformatics. 2001;17(Suppl 1):S90-S96 - S90-S96.
Plaisant C, Fekete J-, Grinstein G. Promoting Insight-Based Evaluation of Visualizations: From Contest to Benchmark Repository. Visualization and Computer Graphics, IEEE Transactions on. 2008;14(1):120-134.
Shneiderman B. Promoting universal usability with multi-layer interface design. ACM SIGCAPH Computers and the Physically Handicapped. 2002;(73-74):1-8.
Ateniese G, Kamara S, Katz J. Proofs of storage from homomorphic identification protocols. Advances in Cryptology–ASIACRYPT 2009. 2009:319-333.
Hjaltason GR, Samet H. Properties of embedding methods for similarity searching in metric spaces. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 2003;25(5):530-549.
Shneiderman B. Protecting rights in user interface designs. Sparks of innovation in human-computer interaction. 1993:351.
Khan Z, Bloom JS, Garcia BA, Singh M, Kruglyak L. Protein quantification across hundreds of experimental conditions. Proceedings of the National Academy of Sciences. 2009;106(37):15544-15548.
Sane N, Ford J, Harris AI, Bhattacharyya SS. Prototyping scalable digital signal processing systems for radio astronomy using dataflow models. Radio Science. 2012;47(3):n/a - n/a.
Kumar VS, Marathe MV, Parthasarathy S, Srinivasan A. Provable algorithms for joint optimization of transport, routing and MAC layers in wireless ad hoc networks. Proc. DialM-POMC Workshop on Foundations of Mobile Computing. 2007.

Pages