Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Goyal A, Daumé H, Venkatasubramanian S.  2009.  Streaming for large scale NLP: Language modeling. Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :512-520.
Goyal V, Katz J.  2008.  Universally composable multi-party computation with an unreliable common reference string. Theory of Cryptography. :142-154.
Gove R, Dunne C, Shneiderman B, Klavans J, Dorr BJ.  2011.  Evaluating visual and statistical exploration of scientific literature networks. 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). :217-224.
Gove R, Dunne C, Shneiderman B, Klavans J, Dorr BJ.  2011.  Understanding Scientific Literature Networks: An Evaluation of Action Science Explorer.
Gove R, Gramsky N, Kirby R, Sefer E, Sopan A, Dunne C, Shneiderman B, Taieb-Maimon M.  2011.  NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :19-26.
Gouker R, Gupta SK, Bruck H, Holzschuh T.  2006.  Manufacturing of multi-material compliant mechanisms using multi-material molding. The International Journal of Advanced Manufacturing Technology. 30(11):1049-1075.
Gou H, M. Wu.  2005.  Data hiding in curves with application to fingerprinting maps. Signal Processing, IEEE Transactions on. 53(10):3988-4005.
Gou H, M. Wu.  2007.  Improving Embedding Payload in Binary Imageswith "Super-Pixels". Image Processing, 2007. ICIP 2007. IEEE International Conference on. 3:III-277-III-280-III-277-III-280.
Gou H, Wu M.  2005.  Fingerprinting curves. Digital Watermarking. :13-28.
Gou H, M. Wu.  2004.  Data hiding in curves for collusion-resistant digital fingerprinting. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:51-54Vol.1-51-54Vol.1.
Gou H, Swaminathan A, Wu M.  2007.  Robust scanner identification based on noise features. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. 6505:0S–0T-0S–0T.
Gou H, Swaminathan A, M. Wu.  2007.  Noise Features for Image Tampering Detection and Steganalysis. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 6:VI-97-VI-100-VI-97-VI-100.
Gou H, Wu M.  2005.  Robust digital fingerprinting for curves. Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05). 2:529-532.
Gou H, Swaminathan A, M. Wu.  2009.  Intrinsic Sensor Noise Features for Forensic Analysis on Scanners and Scanned Images. Information Forensics and Security, IEEE Transactions on. 4(3):476-491.
Gou H, Wu M.  2006.  Fingerprinting digital elevation maps. Proceedings of SPIE. 6072:373-384.
Gordon D, Perlis D.  1995.  Explicitly Biased Generalization. Goal-Driven Learning. :321-354.
Gordon S, Katz J, Kumaresan R, Yerukhimovich A.  2010.  Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
Gordon S, Katz J.  2006.  Rational secret sharing, revisited. Security and Cryptography for Networks. :229-241.
Gordon S, Katz J, Vaikuntanathan V.  2010.  A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. :395-412.
Gordon S, Katz J.  2009.  Complete fairness in multi-party computation without an honest majority. Theory of Cryptography. :19-35.
Gordon D, Perlis D.  1989.  Explicitly biased generalization. Computational Intelligence. 5(2):67-81.
Gordon DF, desJardins M.  1995.  Evaluation and selection of biases in machine learning. Machine Learning. 20(1):5-22.
Gordon S, Katz J.  2010.  Partial fairness in secure two-party computation. Advances in Cryptology–EUROCRYPT 2010. :157-176.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Gordon DS, Hazay C, Katz J, Lindell Y.  2011.  Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.

Pages