Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2010
Feamster N.  2010.  Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks. :37-42.
Brakerski Z, Kalai YT, Katz J, Vaikuntanathan V.  2010.  Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
Chalfoun J, Cardone A, Dima AA, Allen DP, Halter MW.  2010.  Overlap-based cell tracker. The Journal of Research of the National Institute of Standards and Technology. 115(6)
Bhattacharjee B, Rabinovich M.  2010.  Overlay Networking and Resiliency. Guide to Reliable Internet Services and Applications. :221-251.
Albanese M, Chellappa R, Cuntoor N, Moscato V, Picariello A, V.S. Subrahmanian, Udrea O.  2010.  PADS: A Probabilistic Activity Detection Framework for Video Data. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 32(12):2246-2261.
Katz J, Shin JS, Smith A.  2010.  Parallel and concurrent security of the HB and HB+ protocols. Journal of cryptology. 23(3):402-421.
Grushin A, Reggia JA.  2010.  Parsimonious rule generation for a nature-inspired approach to self-assembly. ACM Transactions on Autonomous and Adaptive Systems (TAAS). 5(3):1-24.
Gordon S, Katz J.  2010.  Partial fairness in secure two-party computation. Advances in Cryptology–EUROCRYPT 2010. :157-176.
Srinivasan B V, Schwartz W R, Duraiswami R, Davis LS.  2010.  Partial least squares on graphical processor for efficient pattern recognition. Technical Reports of the Computer Science Department.
Seo W, Agrawal M, Doermann D.  2010.  Performance Evaluation Tools for Zone Segmentation and Classification (PETS). International Conference on Pattern Recognition. :503-506.
Chuang WH, Varna AL, Wu M.  2010.  Performance impact of ordinal ranking on content fingerprinting. IEEE Int. Conf. on Image Processing.
Caceres A, Shang F, Wawrousek E, Liu Q, Avidan O, Cvekl A, Yang Y, Haririnia A, Storaska A, Fushman D et al..  2010.  Perturbing the Ubiquitin Pathway Reveals How Mitosis Is Hijacked to Denucleate and Regulate Cell Proliferation and Differentiation In Vivo. PLoS ONEPLoS ONE. 5(10):e13331-e13331.
Wu M.  2010.  Picturing signal processing [From the Editor]. Signal Processing Magazine, IEEE. 27(1):2-3.
Zotkin DN, Duraiswami R, Gumerov NA.  2010.  Plane-Wave Decomposition of Acoustical Scenes Via Spherical and Cylindrical Microphone Arrays. IEEE Transactions on Audio, Speech, and Language Processing. 18(1):2-16.
Smolyaninov II, Vishkin U, Davis CC.  2010.  Plasmonic Systems and Devices Utilizing Surface Plasmon Polariton. 12/697,595
Park S, O'Leary DP.  2010.  Portfolio Selection Using Tikhonov Filtering to Estimate the Covariance Matrix. SIAM Journal on Financial Mathematics. 1:932-961.
Liu M-Y, Tuzel O, Veeraraghavan A, Chellappa R, Agrawal A, Okuda H.  2010.  Pose estimation in heavy clutter using a multi-flash camera. Robotics and Automation (ICRA), 2010 IEEE International Conference on. :2028-2035.
Biswas S, Chellappa R.  2010.  Pose-robust albedo estimation from a single image. Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on. :2683-2690.
Navlakha S, Kingsford C.  2010.  The power of protein interaction networks for associating genes with diseases. Bioinformatics. 26(8):1057-1057.
Haley BJ, Grim CJ, Hasan NA, Taviani E, Chun J, Brettin TS, Bruce DC, Challacombe JF, Detter CJ, Han CS et al..  2010.  The pre‐seventh pandemic Vibrio cholerae BX 330286 El Tor genome: evidence for the environment as a genome reservoir. Environmental Microbiology Reports. 2(1):208-216.
Bröcheler M, Mihalkova L, Getoor L.  2010.  Probabilistic similarity logic. Proceedings of the Conference on Uncertainty in Artificial Intelligence.
Zellner ML, Riolo RL, Rand W, Brown DG, Page SE, Fernandez LE.  2010.  The problem with zoning: nonlinear effects of interactions between location preferences and externalities on land use and utility. Environment and Planning B: Planning and Design. 37(3):408-428.
Katz J.  2010.  Public-Key Cryptography. Handbook of Information and Communication Security. :21-34.
Earl C, Might M, Van Horn D.  2010.  Pushdown Control-Flow Analysis of Higher-Order Programs. arXiv:1007.4268 [cs].
Jimmy Lin, Madnani N, Dorr BJ.  2010.  Putting the user in the loop: interactive Maximal Marginal Relevance for query-focused summarization. Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :305-308.

Pages