Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Sherwood R, Braud R, Bhattacharjee B.  2004.  A cooperative bulk transfer protocol. IEEE Infocom.
Sherwood R, Bender A, Spring N.  2008.  Discarte: a disjunctive internet cartographer. ACM SIGCOMM Computer Communication Review. 38(4):303-314.
Sherwood R, Spring N.  2006.  A platform for unobtrusive measurements on PlanetLab. Proceedings of the 3rd conference on USENIX Workshop on Real, Large Distributed Systems - Volume 3. :2-2.
Sherwood R, Lee S, Bhattacharjee B.  2006.  Cooperative peer groups in NICE. Computer Networks. 50(4):523-544.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Sherwood R, Spring N.  2006.  Touring the internet in a TCP sidecar. Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. :339-344.
Sherwood R, Bhattacharjee B, Braud R.  2005.  Misbehaving TCP receivers can cause internet-wide congestion collapse. Proceedings of the 12th ACM conference on Computer and communications security. :383-392.
Sheshagiri M, desJardins M, Finin T.  2003.  A planner for composing services described in DAML-S. International Conference on Automated Planning and Scheduling (ICAPS) 2003 Workshop on planning for web services.
Shet V, Harwood D, Davis LS.  2006.  Multivalued default logic for identity maintenance in visual surveillance. Computer Vision–ECCV 2006. :119-132.
Shet VD, Harwood D, Davis LS.  2006.  Top-down, bottom-up multivalued default reasoning for identity maintenance. Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks. :79-86.
Shet VD, Harwood D, Davis LS.  2005.  VidMAP: video monitoring of activity with Prolog. Advanced Video and Signal Based Surveillance, 2005. AVSS 2005. IEEE Conference on. :224-229.
Shet VD, Neumann J, Ramesh V, Davis LS.  2007.  Bilattice-based Logical Reasoning for Human Detection. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Shet VD, Prasad VSN, Elgammal A, Yacoob Y, Davis LS.  2004.  Multi-cue exemplar-based nonparametric model for gesture recognition. Indian Conference on Computer Vision, Graphics and Image Processing. :16-18.
Shevtsova N, Reggia JA.  2002.  Effects of callosal lesions in a model of letter perception. Cognitive, Affective, & Behavioral Neuroscience. 2(1):37-37.
Shevtsova N, Reggia JA.  1999.  Lesion effects in a bihemispheric letter-identification model. Neural Networks, 1999. IJCNN'99. International Joint Conference on. 1:215-218.
Shevtsova N, Reggia JA.  1999.  A neural network model of lateralization during letter identification. Journal of Cognitive Neuroscience. 11(2):167-181.
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
Shi Q, JaJa JF.  2003.  Fast Fractional Cascading and Its Applications. UMIACS-TR-2003-71
Elaine Shi, Bethencourt J, Chan T-HH, Song D, Perrig A.  2007.  Multi-Dimensional Range Query over Encrypted Data. :350-364.
Shi Q, JaJa JF.  2005.  A new framework for addressing temporal range queries and some preliminary results. Theoretical Computer Science. 332(1–3):109-121.
Shi Q, JaJa JF.  2003.  Fast Algorithms for 3-D Dominance Reporting and Counting. UMIACS-TR-2003-06
Shi Q, JaJa JF.  2005.  Techniques for indexing and querying temporal observations for a collection of objects. Algorithms and Computation. :822-834.
Shi Q, JaJa JF.  2006.  Efficient Isosurface Extraction for Large Scale Time-Varying Data Using the Persistent Hyperoctree (PHOT). UMIACS-TR-2006-01
Elaine Shi, Chan T, Rieffel E, Chow R, Song D.  2011.  Privacy-preserving aggregation of time-series data. 17
Shi E, Stefanov E, Papamanthou C.  2013.  Practical Dynamic Proofs of Retrievability. CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . :325-336.

Pages