Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2008
Triandopoulos N, Goodrich MT, Papamanthou C, Tamassia R.  2008.  Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science. :80-96.
Duraiswami R, O'donovan A, Neumann J, Gumerov NA.  2008.  Audio Camera Using Microphone Arrays for Real Time Capture of Audio Images .... 12/127,451
Lieberman MD, Sankaranarayanan J, Samet H, Sperling J.  2008.  Augmenting spatio-textual search with an infectious disease ontology. Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International Conference on. :266-269.
Papamanthou C, Tamassia R, Triandopoulos N.  2008.  Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
Ramachandran AV, Feamster N.  2008.  Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
Grushin A, Reggia JA.  2008.  Automated design of distributed control rules for the self-assembly of prespecified artificial structures. Robotics and Autonomous Systems. 56(4):334-359.
Morariu V, Srinivasan BV, Raykar VC, Duraiswami R, Davis LS.  2008.  Automatic online tuning for fast Gaussian summation. Advances in Neural Information Processing Systems.
Memon AM.  2008.  Automatically repairing event sequence-based GUI test suites for regression testing. ACM Transactions on Software Engineering and Methodology (TOSEM). 18(2):4:1–4:36-4:1–4:36.
V.S. Subrahmanian, Reforgiato D.  2008.  AVA: Adjective-Verb-Adverb Combinations for Sentiment Analysis. Intelligent Systems, IEEE. 23(4):43-50.
Deligiannakis A, Kotidis Y, Roussopoulos N.  2008.  Bandwidth-constrained queries in sensor networks. The VLDB Journal. 17(3):443-467.
Liu P, Shi Q, Daumé H, Voth GA.  2008.  A Bayesian statistics approach to multiscale coarse graining. The Journal of chemical physics. 129:214114-214114.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Gupta A, Davis LS.  2008.  Beyond nouns: Exploiting prepositions and comparative adjectives for learning visual classifiers. Computer Vision–ECCV 2008. :16-29.
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Huq A, Whitehouse CA, Grim CJ, Alam M, Colwell RR.  2008.  Biofilms in water, its role and impact in human disease transmission. Current Opinion in Biotechnology. 19(3):244-247.
Pop M, Salzberg SL.  2008.  Bioinformatics challenges of new sequencing technology. Trends in Genetics. 24(3):142-149.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2008.  Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
Stewart G.W.  2008.  Block Gram–Schmidt Orthogonalization. SIAM Journal on Scientific Computing. 31(1):761-775.
Katz J.  2008.  Bridging game theory and cryptography: recent results and future directions. Proceedings of the 5th conference on Theory of cryptography. :251-272.
Srinivasan A.  2008.  Budgeted Allocations in the Full-Information Setting. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 5171:247-253.
McMaster S, Memon AM.  2008.  Call-Stack Coverage for GUI Test Suite Reduction. Software Engineering, IEEE Transactions on. 34(1):99-115.
Liu X, Doermann D, Li H.  2008.  Camera Phone Based Tools for People with Visual Impairments. The First International Workshop on Mobile Multimedia Processing.
Feamster N, Gray A.  2008.  Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
Čomić L, De Floriani L.  2008.  Cancellation of critical points in 2D and 3D Morse and Morse-Smale complexes. Discrete Geometry for Computer Imagery. :117-128.

Pages