Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Sherwood R, Bender A, Spring N.  2008.  Discarte: a disjunctive internet cartographer. ACM SIGCOMM Computer Communication Review. 38(4):303-314.
Sherwood R, Spring N.  2006.  A platform for unobtrusive measurements on PlanetLab. Proceedings of the 3rd conference on USENIX Workshop on Real, Large Distributed Systems - Volume 3. :2-2.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Sherwood R, Braud R, Bhattacharjee B.  2004.  A cooperative bulk transfer protocol. IEEE Infocom.
Sherwood R, Spring N.  2006.  Touring the internet in a TCP sidecar. Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. :339-344.
Sherwood R, Lee S, Bhattacharjee B.  2006.  Cooperative peer groups in NICE. Computer Networks. 50(4):523-544.
Sherwood R, Bhattacharjee B, Braud R.  2005.  Misbehaving TCP receivers can cause internet-wide congestion collapse. Proceedings of the 12th ACM conference on Computer and communications security. :383-392.
Sheshagiri M, desJardins M, Finin T.  2003.  A planner for composing services described in DAML-S. International Conference on Automated Planning and Scheduling (ICAPS) 2003 Workshop on planning for web services.
Shet V, Harwood D, Davis LS.  2006.  Multivalued default logic for identity maintenance in visual surveillance. Computer Vision–ECCV 2006. :119-132.
Shet VD, Neumann J, Ramesh V, Davis LS.  2007.  Bilattice-based Logical Reasoning for Human Detection. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.
Shet VD, Harwood D, Davis LS.  2006.  Top-down, bottom-up multivalued default reasoning for identity maintenance. Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks. :79-86.
Shet VD, Harwood D, Davis LS.  2005.  VidMAP: video monitoring of activity with Prolog. Advanced Video and Signal Based Surveillance, 2005. AVSS 2005. IEEE Conference on. :224-229.
Shet VD, Prasad VSN, Elgammal A, Yacoob Y, Davis LS.  2004.  Multi-cue exemplar-based nonparametric model for gesture recognition. Indian Conference on Computer Vision, Graphics and Image Processing. :16-18.
Shevtsova N, Reggia JA.  1999.  A neural network model of lateralization during letter identification. Journal of Cognitive Neuroscience. 11(2):167-181.
Shevtsova N, Reggia JA.  2002.  Effects of callosal lesions in a model of letter perception. Cognitive, Affective, & Behavioral Neuroscience. 2(1):37-37.
Shevtsova N, Reggia JA.  1999.  Lesion effects in a bihemispheric letter-identification model. Neural Networks, 1999. IJCNN'99. International Joint Conference on. 1:215-218.
Elaine Shi, Stoica I, Andersen DG, Perrig A.  2006.  OverDoSe: A generic DDoS protection service using an overlay network.
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.
Shi Q, JaJa JF.  2006.  Efficient Isosurface Extraction for Large Scale Time-Varying Data Using the Persistent Hyperoctree (PHOT). UMIACS-TR-2006-01
Elaine Shi, Bethencourt J, Chan T-HH, Song D, Perrig A.  2007.  Multi-Dimensional Range Query over Encrypted Data. :350-364.
Elaine Shi, Perrig A.  2004.  Designing secure sensor networks. Wireless Communications, IEEE. 11(6):38-43.
Shi Q, JaJa JF, Mortensen C.  2003.  Space-Efficient and Fast Algorithms for Multidimensional Dominance Reporting and Range Counting. UMIACS-TR-2003-101
Elaine Shi.  2008.  Evaluating predicates over encrypted data.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Shi E, Stefanov E, Papamanthou C.  2013.  Practical Dynamic Proofs of Retrievability. CCS '13 Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security . :325-336.

Pages