Publications
Export 124 results:
Author Title Type [ Year] Filters: Keyword is Computer science [Clear All Filters]
2012. Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
2012. Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
2011. Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
2011. TreeVersity: Comparing tree structures by topology and node's attributes differences. 2011 IEEE Conference on Visual Analytics Science and Technology (VAST). :275-276.
2010. On Computing Compression Trees for Data Collection in Wireless Sensor Networks. 2010 Proceedings IEEE INFOCOM. :1-9.
2010. Decentralized dynamic scheduling across heterogeneous multi-core desktop grids. 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW). :1-9.
2010. New Constructive Aspects of the Lovasz Local Lemma. 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS). :397-406.
2009. Combining powerful local and global statistics for texture description. IEEE Conference on Computer Vision and Pattern Recognition, 2009. CVPR 2009. :573-580.
2009. Distributed Strategies for Channel Allocation and Scheduling in Software-Defined Radio Networks. IEEE INFOCOM 2009. :1521-1529.
2009. First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. International Conference on Computational Science and Engineering, 2009. CSE '09. 4:332-339.
2009. Minimizing Communication Cost in Distributed Multi-query Processing. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :772-783.
2009. Planning for Interactions among Autonomous Agents. Programming Multi-Agent Systems. 5442:1-23.
2009. Techniques to audit and certify the long-term integrity of digital archives. International Journal on Digital Libraries. 10(2):123-131.
2009. Understanding social computing participation with visual exploration tools. International Symposium on Collaborative Technologies and Systems, 2009. CTS '09. :xi-xii-xi-xii.
2008. Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
2008. Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
2008. Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
2008. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
2008. Guest Editors' Introduction to the Special Section on Algorithms in Bioinformatics. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 5(4):482-483.
2007. Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10^30,000 worlds. Annals of Mathematics and Artificial Intelligence. 51(2):295-331.
2007. Efficient lookup on unstructured topologies. IEEE Journal on Selected Areas in Communications. 25(1):62-72.