Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Journal Articles
Zhao HV, M. Wu, Wang ZJ, Liu KJR.  2005.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Image Processing, IEEE Transactions on. 14(5):646-661.
Lu W, Varna AL, Wu M.  2010.  Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.
Tse C, Krafft C, Mayergoyz ID, McAvoy P, Tseng C-Y.  2005.  Forensic recovery of hard disk data by using the spin-stand imaging technique. Proceedings of SPIE. 5778(1):595-606.
Grant J, Kraus S, Perlis D.  2005.  Formal approaches to teamwork. We Will Show Them: Essays in Honour of Dov Gabbay. 1:39-68.
Reggia JA, Nau DS, Wang P, Peng Y.  1985.  A formal model of abductive inference. Information Sciences. 37:227-285.
Reggia JA, Nau DS, Wang PY, Peng Y.  1985.  A formal model of diagnostic inference, II. Algorithmic solution and application. Information Sciences. 37(1-3):257-285.
Ray A, Cleaveland R.  2004.  Formal Modeling Of Middleware-based Distributed Systems. Electronic Notes in Theoretical Computer Science. 108:21-37.
Tian J, Zelkowitz MV.  1992.  A formal program complexity model and its application. Journal of Systems and Software. 17(3):253-266.
Ramasamy HV, Cukier M, Sanders WH.  2003.  Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
Bierman G, Hicks MW, Sewell P, Stoyle G.  2003.  Formalizing dynamic software updating. Proceedings of the Second International Workshop on Unanticipated Software Evolution (USE).
Canetti R, Halevi S, Katz J.  2003.  A forward-secure public-key encryption scheme. Advances in Cryptology—Eurocrypt 2003. :646-646.
Canetti R, Halevi S, Katz J.  2007.  A forward-secure public-key encryption scheme. Journal of Cryptology. 20(3):265-294.
Shaman J., Solomon S., Colwell RR, Field C.B.  2013.  Fostering advances in interdisciplinary climate science. Proceedings of the National Academy of Sciences. (Supplement_114869243Supplement_1):3653-3656.
Stewart G.W.  1999.  Four algorithms for the efficient computation of truncated pivoted QR approximations to a sparse matrix. Numerische Mathematik. 83(2):313-323.
Chan TF, Elman H.  1989.  Fourier Analysis of Iterative Methods for Elliptic Problems. SIAM Review. 31(1):20-49.
Elman H, Ramage A.  2006.  Fourier analysis of multigrid for a model two-dimensional convection-diffusion equation. BIT Numerical Mathematics. 46(2):283-306.
Jacobs DW, Rokers B, Rudra A, Liu Z.  2001.  Fragment completion in humans and machines. NIPS. :27-34.
Methé BA, Nelson KE, Pop M, Creasy HH, Giglio MG, Huttenhower C, Gevers D, Petrosino JF, Abubucker S, Badger JH.  2012.  A framework for human microbiome research. Nature. 486:215-221.
Shneiderman B.  1997.  A framework for search interfaces. IEEE Software. 14(2):18-20.
Corrada Bravo H, Page D, Ramakrishnan R, Shavlik J, Costa VS.  2005.  A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
Varna AL, Chuang WH, Wu M.  2010.  A framework for theoretical analysis of content fingerprinting. Proc. of SPIE Media Forensics and Security.
Cukier M, Arlat J, Powell D.  1998.  Frequentist and Bayesian Coverage Estimations for Stratified Fault-Injection. DEPENDABLE COMPUTING AND FAULT TOLERANT SYSTEMS. 11:43-62.
Hochheiser H, Shneiderman B.  2010.  From bowling alone to tweeting together: technology-mediated social participation. Interactions. 17(2):64-67.
O'Leary DP, Stewart G.W.  1987.  From Determinacy to Systaltic Arrays. Computers, IEEE Transactions on. C-36(11):1355-1359.
Getoor L, Koller D, Friedman N.  2000.  From instances to classes in probabilistic relational models. Proc. ICML 2000 Workshop on Attribute-Value and Relational Learning.

Pages