Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Gordon DS, Hazay C, Katz J, Lindell Y.  2011.  Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.
Gordon D, Perlis D.  1995.  Explicitly Biased Generalization. Goal-Driven Learning. :321-354.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Gordon DF, desJardins M.  1995.  Evaluation and selection of biases in machine learning. Machine Learning. 20(1):5-22.
Gordon S, Katz J, Vaikuntanathan V.  2010.  A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. :395-412.
Gordon S, Katz J, Kumaresan R, Yerukhimovich A.  2010.  Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
Gordon S, Katz J.  2010.  Partial fairness in secure two-party computation. Advances in Cryptology–EUROCRYPT 2010. :157-176.
Gordon D, Perlis D.  1989.  Explicitly biased generalization. Computational Intelligence. 5(2):67-81.
Gou H, M. Wu.  2005.  Data hiding in curves with application to fingerprinting maps. Signal Processing, IEEE Transactions on. 53(10):3988-4005.
Gou H, M. Wu.  2007.  Improving Embedding Payload in Binary Imageswith "Super-Pixels". Image Processing, 2007. ICIP 2007. IEEE International Conference on. 3:III-277-III-280-III-277-III-280.
Gou H, Wu M.  2005.  Fingerprinting curves. Digital Watermarking. :13-28.
Gou H, M. Wu.  2004.  Data hiding in curves for collusion-resistant digital fingerprinting. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:51-54Vol.1-51-54Vol.1.
Gou H, Swaminathan A, Wu M.  2007.  Robust scanner identification based on noise features. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. 6505:0S–0T-0S–0T.
Gou H, Swaminathan A, M. Wu.  2007.  Noise Features for Image Tampering Detection and Steganalysis. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 6:VI-97-VI-100-VI-97-VI-100.
Gou H, Wu M.  2005.  Robust digital fingerprinting for curves. Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05). 2:529-532.
Gou H, Swaminathan A, M. Wu.  2009.  Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images. Information Forensics and Security, IEEE Transactions on. 4(3):476-491.
Gou H, Wu M.  2006.  Fingerprinting digital elevation maps. Proceedings of SPIE. 6072:373-384.
Gouker R, Gupta SK, Bruck H, Holzschuh T.  2006.  Manufacturing of multi-material compliant mechanisms using multi-material molding. The International Journal of Advanced Manufacturing Technology. 30(11):1049-1075.
Gove R, Gramsky N, Kirby R, Sefer E, Sopan A, Dunne C, Shneiderman B, Taieb-Maimon M.  2011.  NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :19-26.
Gove R, Dunne C, Shneiderman B, Klavans J, Dorr BJ.  2011.  Evaluating visual and statistical exploration of scientific literature networks. 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). :217-224.
Gove R, Dunne C, Shneiderman B, Klavans J, Dorr BJ.  2011.  Understanding Scientific Literature Networks: An Evaluation of Action Science Explorer.
Goyal A, Daumé H, Venkatasubramanian S.  2009.  Streaming for large scale NLP: Language modeling. Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :512-520.
Goyal V, Katz J.  2008.  Universally composable multi-party computation with an unreliable common reference string. Theory of Cryptography. :142-154.
Grand J, Cummings MP, Rebelo TG, Ricketts TH, Neel MC.  2007.  Biased data reduce efficiency and effectiveness of conservation reserve networks. Ecology Letters. 10(5):364-374.
Grant J, Kraus S, Perlis D.  2000.  A logic for characterizing multiple bounded agents. Autonomous Agents and Multi-Agent Systems. 3(4):351-387.

Pages