Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Journal Articles
Hicks MW, Foster JS.  2010.  SCORE: agile research group management. Commun. ACM. 53(10):30-31.
Yi L, Zheng Y, Doermann D, Jaeger S.  2008.  Script-Independent Text Line Segmentation in Freestyle Handwritten Documents. IEEETransactions on Pattern Analysis and Machine Intelligence. :1313-1329.
Funkhouser T, Min P, Kazhdan M, Chen J, Halderman A, Dobkin D, Jacobs DW.  2003.  A search engine for 3D models. ACM Trans. Graph.. 22(1):83-105.
Plaisant C, Lam S, Shneiderman B, Smith MS, Roseman D, Marchand G, Gillam M, Feied C, Handler J, Rappaport H.  2008.  Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
Langmead B, Schatz MC, Jimmy Lin, Pop M, Salzberg SL.  2009.  Searching for SNPs with cloud computing. Genome Biology. 10(11):R134-R134.
Kim J, Oard D, Soergel D.  2003.  Searching large collections of recorded speech: A preliminary study. Proceedings of the American Society for Information Science and Technology. 40(1):330-339.
Jong F D, Oard D, Ordelman R, Raaijmakers S.  2007.  Searching spontaneous conversational speech. ACM SIGIR Forum. 41:104-104.
Belhumeur P, Chen D, Feiner S, Jacobs DW, Kress W, Ling H, Lopez I, Ramamoorthi R, Sheorey S, White S.  2008.  Searching the world’s herbaria: A system for visual identification of plant species. Computer Vision–ECCV 2008. :116-129.
Alam M, Hasan NA, Sadique A, Bhuiyan NA, Ahmed KU, Nusrin S, Nair BG, Siddique AK, Sack BR, Sack DA et al..  2006.  Seasonal Cholera Caused by Vibrio Cholerae Serogroups O1 and O139 in the Coastal Aquatic Environment of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 72(6):4096-4104.
Stine CO, Alam M, Tang L, Nair BG, Siddique KA, Faruque SM, Huq A, Colwell RR, Sack BR, Morris GJ.  2008.  Seasonal Cholera from Multiple Small Outbreaks, Rural Bangladesh. Emerging Infectious DiseasesEmerg Infect Dis. 14(5):831-833.
Zotenko E, O'Leary DP, Przytycka TM.  2006.  Secondary Structure Spatial Conformation Footprint: A Novel Method for Fast Protein Structure Comparison and Classification. BMC Structural Biology. 6(12)
Neel MC, Cummings MP.  2004.  Section-level relationships of North American ıt Agalinis (Orobanchaceae) based on DNA sequence analysis of three chloroplast gene regions. BMC Evol Biol. 4:15-15.
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM.  1998.  A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
Bonatti PA, Kraus S, V.S. Subrahmanian.  2003.  Secure agents. Annals of Mathematics and Artificial Intelligence. 37(1):169-235.
Pillai J, Patel VM, Chellappa R, Ratha N.  2010.  Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
Baden R, Bender A, Levin D, Sherwood R, Spring N, Bhattacharjee B.  2007.  A Secure DHT via the Pigeonhole Principle. Technical Reports of the Computer Science Department, CS-TR-4884.
M. Wu, Mui L, Mohtashemi M, Szolovits P.  2001.  Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
Bhattacharjee B, Rodrigues R, Kouznetsov P.  2007.  Secure lookup without (constrained) flooding. WRAITS 2007.
Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D.  2012.  Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
Gennaro R, Katz J, Krawczyk H, Rabin T.  2010.  Secure network coding over the integers. Public Key Cryptography–PKC 2010. :142-160.
Hicks MW, Keromytis AD, Smith JM.  2003.  A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM.  2000.  Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.
Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A.  2005.  Secure remote authentication using biometric data. Advances in Cryptology–EUROCRYPT 2005. :147-163.
Ray A, Sengupta B, Cleaveland R.  2005.  Secure requirements elicitation through triggered message sequence charts. Distributed Computing and Internet Technology. :273-282.
Katz J.  2004.  Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.

Pages