Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Shin C, Doermann D.  1999.  Classification of Document Page Images. SDIUT99. :166-175.
Shin M, Arbaugh WA.  2009.  Efficient peer-to-Peer lookup in multi-hop wireless networks. KSII Trans. Internet and Information Systems. 3(1):5-25.
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Shiloach Y, Vishkin U.  1981.  Finding the maximum, merging, and sorting in a parallel computation model. Journal of Algorithms. 2(1):88-102.
Shiloach Y, Vishkin U, An O.  1982.  parallel MAX-FLOW algorithm. Journal of Algorithms. 3:128-146.
Shiloach Y, Vishkin U.  1982.  An O (logn) parallel connectivity algorithm. Journal of Algorithms. 3(1):57-67.
Shiloach Y, Vishkin U.  1982.  An O (n2log n) parallel max-flow algorithm. Journal of Algorithms. 3(2):128-146.
Shih YT, Elman H.  2000.  Iterative methods for stabilized discrete convection-diffusion problems. IMA journal of numerical analysis. 20(3):333-333.
Shih Y-T, Elman H.  1999.  Modified streamline diffusion schemes for convection-diffusion problems. Computer Methods in Applied Mechanics and Engineering. 174(1-2):137-151.
Shi Q, JaJa JF.  2005.  Optimal and near-optimal algorithms for generalized intersection reporting on pointer machines. Information Processing Letters. 95(3):382-388.
Shi Q, JaJa JF.  2003.  Fast Algorithms for 3-D Dominance Reporting and Counting. UMIACS-TR-2003-06
Shi Q, JaJa JF.  2005.  A new framework for addressing temporal range queries and some preliminary results. Theoretical Computer Science. 332(1–3):109-121.
Elaine Shi, Chan T, Rieffel E, Chow R, Song D.  2011.  Privacy-preserving aggregation of time-series data. 17
Shi Q, JaJa JF.  2006.  Efficient Isosurface Extraction for Large Scale Time-Varying Data Using the Persistent Hyperoctree (PHOT). UMIACS-TR-2006-01
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Elaine Shi, Stoica I, Andersen DG, Perrig A.  2006.  OverDoSe: A generic DDoS protection service using an overlay network.
Shi Q, JaJa JF, Mortensen C.  2003.  Space-Efficient and Fast Algorithms for Multidimensional Dominance Reporting and Range Counting. UMIACS-TR-2003-101
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.
Elaine Shi, Bethencourt J, Chan T-HH, Song D, Perrig A.  2007.  Multi-Dimensional Range Query over Encrypted Data. :350-364.
Elaine Shi, Perrig A.  2004.  Designing secure sensor networks. Wireless Communications, IEEE. 11(6):38-43.
Shi Q, JaJa JF.  2003.  An O(n)-Space O(log n/log log n + f)-Query Time Algorithm for 3-D Dominance Reporting. UMIACS-TR-2003-77
Elaine Shi.  2008.  Evaluating predicates over encrypted data.
Shi Q, JaJa JF.  2002.  Efficient techniques for range search queries on earth science data. Scientific and Statistical Database Management, 2002. Proceedings. 14th International Conference on. :142-151.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Shi E, Stefanov E, Papamanthou C.  2013.  Practical Dynamic Proofs of Retrievability. CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . :325-336.

Pages