Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
Shin C, Doermann D, Rosenfeld A.  2003.  Measuring Structural Similarity of Document Pages for Searching Document Image Databases. 5th IASTEDInternational Conference on Signal and Image Processing. :320-325.
Shin C, Doermann D.  1999.  Classification of Document Page Images. SDIUT99. :166-175.
Shiloach Y, Vishkin U.  1981.  Finding the maximum, merging, and sorting in a parallel computation model. Journal of Algorithms. 2(1):88-102.
Shiloach Y, Vishkin U, An O.  1982.  parallel MAX-FLOW algorithm. Journal of Algorithms. 3:128-146.
Shiloach Y, Vishkin U.  1982.  An O (logn) parallel connectivity algorithm. Journal of Algorithms. 3(1):57-67.
Shiloach Y, Vishkin U.  1982.  An O (n2log n) parallel max-flow algorithm. Journal of Algorithms. 3(2):128-146.
Shih Y-T, Elman H.  1999.  Modified streamline diffusion schemes for convection-diffusion problems. Computer Methods in Applied Mechanics and Engineering. 174(1-2):137-151.
Shih YT, Elman H.  2000.  Iterative methods for stabilized discrete convection-diffusion problems. IMA journal of numerical analysis. 20(3):333-333.
Shi Q, JaJa JF.  2003.  Fast Fractional Cascading and Its Applications. UMIACS-TR-2003-71
Shi Q, JaJa JF.  2005.  Optimal and near-optimal algorithms for generalized intersection reporting on pointer machines. Information Processing Letters. 95(3):382-388.
Shi Q, JaJa JF.  2005.  A new framework for addressing temporal range queries and some preliminary results. Theoretical Computer Science. 332(1–3):109-121.
Shi Q, JaJa JF.  2003.  Fast Algorithms for 3-D Dominance Reporting and Counting. UMIACS-TR-2003-06
Elaine Shi, Chan T, Rieffel E, Chow R, Song D.  2011.  Privacy-preserving aggregation of time-series data. 17
Shi Q, JaJa JF.  2006.  Efficient Isosurface Extraction for Large Scale Time-Varying Data Using the Persistent Hyperoctree (PHOT). UMIACS-TR-2006-01
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Shi Q, JaJa JF, Mortensen C.  2003.  Space-Efficient and Fast Algorithms for Multidimensional Dominance Reporting and Range Counting. UMIACS-TR-2003-101
Elaine Shi, Stoica I, Andersen DG, Perrig A.  2006.  OverDoSe: A generic DDoS protection service using an overlay network.
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.
Elaine Shi, Bethencourt J, Chan T-HH, Song D, Perrig A.  2007.  Multi-Dimensional Range Query over Encrypted Data. :350-364.
Elaine Shi, Perrig A.  2004.  Designing secure sensor networks. Wireless Communications, IEEE. 11(6):38-43.
Shi Q, JaJa JF.  2003.  An O(n)-Space O(log n/log log n + f)-Query Time Algorithm for 3-D Dominance Reporting. UMIACS-TR-2003-77
Elaine Shi.  2008.  Evaluating predicates over encrypted data.
Shi Q, JaJa JF.  2002.  Efficient techniques for range search queries on earth science data. Scientific and Statistical Database Management, 2002. Proceedings. 14th International Conference on. :142-151.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.

Pages