Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Tom Yeh, Tollmar K, Darrell T.  2004.  Searching the web with mobile images for location recognition. Computer Vision and Pattern Recognition, 2004. CVPR 2004. Proceedings of the 2004 IEEE Computer Society Conference on. 2:76-81.
Belhumeur P, Chen D, Feiner S, Jacobs DW, Kress W, Ling H, Lopez I, Ramamoorthi R, Sheorey S, White S.  2008.  Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
Alam M, Hasan NA, Sadique A, Bhuiyan NA, Ahmed KU, Nusrin S, Nair BG, Siddique AK, Sack BR, Sack DA et al..  2006.  Seasonal Cholera Caused by Vibrio Cholerae Serogroups O1 and O139 in the Coastal Aquatic Environment of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 72(6):4096-4104.
Stine CO, Alam M, Tang L, Nair BG, Siddique KA, Faruque SM, Huq A, Colwell RR, Sack BR, Morris GJ.  2008.  Seasonal Cholera from Multiple Small Outbreaks, Rural Bangladesh. Emerging Infectious DiseasesEmerg Infect Dis. 14(5):831-833.
Song Z, Roussopoulos N.  2003.  SEB-tree: An approach to index continuously moving objects. Mobile Data Management. :340-344.
Dumitras T, Neamtiu I, Tilevich E.  2009.  Second ACM Workshop on Hot Topics in Software Upgrades (HotSWUp 2009). :705-706.
Zotenko E, O'Leary DP, Przytycka TM.  2006.  Secondary Structure Spatial Conformation Footprint: A Novel Method for Fast Protein Structure Comparison and Classification. BMC Structural Biology. 6(12)
Neel MC, Cummings MP.  2004.  Section-level relationships of North American ıt Agalinis (Orobanchaceae) based on DNA sequence analysis of three chloroplast gene regions. BMC Evol Biol. 4:15-15.
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM.  1998.  A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
Bonatti PA, Kraus S, V.S. Subrahmanian.  2003.  Secure agents. Annals of Mathematics and Artificial Intelligence. 37(1):169-235.
Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
Pillai J, Patel VM, Chellappa R, Ratha N.  2010.  Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Baden R, Bender A, Levin D, Sherwood R, Spring N, Bhattacharjee B.  2007.  A Secure DHT via the Pigeonhole Principle. Technical Reports of the Computer Science Department, CS-TR-4884.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
M. Wu, Mui L, Mohtashemi M, Szolovits P.  2001.  Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
Lu W, Varna AL, Swaminathan A, M. Wu.  2009.  Secure image retrieval through feature protection. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1533-1536.
Bhattacharjee B, Rodrigues R, Kouznetsov P.  2007.  Secure lookup without (constrained) flooding. WRAITS 2007.
Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D.  2012.  Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
Gennaro R, Katz J, Krawczyk H, Rabin T.  2010.  Secure network coding over the integers. Public Key Cryptography–PKC 2010. :142-160.
Hicks MW, Keromytis AD, Smith JM.  2003.  A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
Hicks MW, Keromytis AD, Smith JM.  2002.  A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM.  2000.  Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.
Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A.  2005.  Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. :147-163.

Pages