Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Fayzullin M, V.S. Subrahmanian, Albanese M, Picariello A.  2004.  The priority curve algorithm for video summarization. Proceedings of the 2nd ACM international workshop on Multimedia databases. :28-35.
Zheleva E, Terzi E, Getoor L.  2012.  Privacy in Social Networks. Synthesis Lectures on Data Mining and Knowledge Discovery. 3(1):1-85.
Zheleva E, Getoor L.  2011.  Privacy in social networks: A survey. Social Network Data Analytics. :277-306.
Mashima D, Elaine Shi, Chow R, Sarkar P, Li C, Song D.  2011.  Privacy settings from contextual attributes: A case study using Google Buzz. :257-262.
Elaine Shi, Chan T, Rieffel E, Chow R, Song D.  2011.  Privacy-preserving aggregation of time-series data. 17
Chan HT-H, Elaine Shi, Song D.  2011.  Private and Continual Release of Statistics. ACM Transactions on Information and System Security (TISSEC). 14(3):26:1-26:24.
Huang Y, Evans D, Katz J.  2011.  Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? 19th Network and Distributed Security Symposium.
Hajiaghayi MT, Jain K.  2006.  The prize-collecting generalized Steiner tree problem via a new approach of primal-dual schema. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :631-640.
Getoor L, Grant J.  2006.  PRL: A probabilistic relational language. Machine Learning. 62(1):7-31.
Mishra A, Shin M H, Petroni NL, Clancy TC, Arbaugh WA.  2004.  Proactive key distribution using neighbor graphs. IEEE Wireless Communications. 11(1):26-36.
Zhou S, Chellappa R, Moghaddam B.  2004.  Probabilistic analysis of kernel principal components. NIPS.
Pugh W.  1990.  Probabilistic analysis of set operations with constant-time set equality test. Advances in Computing and Information—ICCI'90. :62-71.
Sharma R, Mount D, Aloimonos Y.  1993.  Probabilistic analysis of some navigation strategies in a dynamic environment. Systems, Man and Cybernetics, IEEE Transactions on. 23(5):1465-1474.
Lindenbaum M, Samet H, Hjaltason GR.  2006.  A probabilistic analysis of trie-based sorting of large collections of line segments in spatial databases. SIAM Journal on Computing. 35(1):22-58.
Plangprasopchok A, Lerman K, Getoor L.  2011.  A probabilistic approach for learning folksonomies from structured data. Proceedings of the fourth ACM international conference on Web search and data mining. :555-564.
Peng Y, Reggia JA.  1987.  A probabilistic causal model for diagnostic problem solving (parts 1 and 2). IEEE Transactions on Systems, Man and Cybernetics. :146-162.
Youssef MA, Agrawala AK, Shankar UA, Noh SH.  2002.  A Probabilistic Clustering-Based Indoor Location Determination System. Technical Reports from UMIACS, UMIACS-TR-2002-30.
Hua S, Qu G, Bhattacharyya SS.  2007.  Probabilistic design of multimedia embedded systems. ACM Transactions on Embedded Computing Systems (TECS). 6(3):15–es-15–es.
desJardins M.  1991.  Probabilistic evaluation of bias for learning systems. Proceedings of the Eighth International Workshop on Machine Learning. :495-499.
Domke J, Aloimonos Y.  2007.  A probabilistic framework for correspondence and egomotion. Dynamical Vision. :232-242.
De la Torre F, Yacoob Y, Davis LS.  2000.  A probabilistic framework for rigid and non-rigid appearance based tracking and recognition. Automatic Face and Gesture Recognition, 2000. Proceedings. Fourth IEEE International Conference on. :491-498.
Han B, Joo S-W, Davis LS.  2007.  Probabilistic Fusion Tracking Using Mixture Kernel-Based Bayesian Filtering. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Han B, Davis LS.  2009.  Probabilistic fusion-based parameter estimation for visual tracking. Computer Vision and Image Understanding. 113(4):435-445.
Parker A, Yaman F, Nau DS, V.S. Subrahmanian.  2007.  Probabilistic go theories.
Gupta A, Kembhavi A, Davis LS.  2009.  Probabilistic graphical models. IEEE transactions on pattern analysis and machine intelligence. 31(10):1775-1789.

Pages