Publications
Export 7151 results:
Author Title Type [ Year] Filters: Unreliable-convergence-criterion-arnoldi%E2%80%99s-method is [Clear All Filters]
2008. Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science. :80-96.
2008. Augmenting spatio-textual search with an infectious disease ontology. Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International Conference on. :266-269.
2008. Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
2008. Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
2008. Automated design of distributed control rules for the self-assembly of prespecified artificial structures. Robotics and Autonomous Systems. 56(4):334-359.
2008. Automatic online tuning for fast Gaussian summation. Advances in Neural Information Processing Systems.
2008. Automatically repairing event sequence-based GUI test suites for regression testing. ACM Transactions on Software Engineering and Methodology (TOSEM). 18(2):4:1–4:36-4:1–4:36.
2008. AVA: Adjective-Verb-Adverb Combinations for Sentiment Analysis. Intelligent Systems, IEEE. 23(4):43-50.
2008. A Bayesian statistics approach to multiscale coarse graining. The Journal of chemical physics. 129:214114-214114.
2008. BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
2008. Beyond nouns: Exploiting prepositions and comparative adjectives for learning visual classifiers. Computer Vision–ECCV 2008. :16-29.
2008. Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
2008. Biofilms in water, its role and impact in human disease transmission. Current Opinion in Biotechnology. 19(3):244-247.
2008. Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
2008. Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
2008. Bridging game theory and cryptography: recent results and future directions. Proceedings of the 5th conference on Theory of cryptography. :251-272.
2008. Budgeted Allocations in the Full-Information Setting. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 5171:247-253.
2008. Call-Stack Coverage for GUI Test Suite Reduction. Software Engineering, IEEE Transactions on. 34(1):99-115.
2008. Camera Phone Based Tools for People with Visual Impairments. The First International Workshop on Mobile Multimedia Processing.
2008. Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
2008. Cancellation of critical points in 2D and 3D Morse and Morse-Smale complexes. Discrete Geometry for Computer Imagery. :117-128.