Publications

Export 479 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Doermann D, Rivlin E, Rosenfeld A.  1996.  The Function of Documents. LAMP-TR-002,CFAR-TR-841,CS-TR-3697
Doermann D, Zotkina E, Li H.  2010.  GEDI - AGroundtruthing Environment for Document Images. Ninth IAPRInternational Workshop on Document Analysis Systems (DAS 2010).
Doermann D, Ma H, Karagol-Ayan B, Oard D.  2002.  Lexicon Acquisition from Bilingual Dictionaries. SPIEPhotonic West Electronic Imaging Conference. :37-48.
Doermann D, Li H, Kia O.  1998.  The detection of duplicates in document image databases. Image and Vision Computing. 16(12–13):907-920.
Doermann D, DeMenthon D.  2000.  Data and Content Based Adaptation for Video Over Low Bandwidth Networks. SPIE- Multimedia and Systems Applicaitons III. :69-78.
Doermann D, Rosenfeld A.  1992.  Recovery of temporal information from static images of handwriting. Proceedings in the IEEE CVPR. :162-168.
Dodis Y, Katz J, Smith A, Walfish S.  2009.  Composability and on-line deniability of authentication. Theory of Cryptography. :146-162.
Dodis Y, Katz J.  2005.  Chosen-ciphertext security of multiple encryption. Theory of Cryptography. :188-209.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Strong key-insulated signature schemes. Public Key Cryptography—PKC 2003. :130-144.
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M.  2003.  Intrusion-resilient public-key encryption. Topics in Cryptology—CT-RSA 2003. :19-32.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Key-insulated public key cryptosystems. Advances in Cryptology—Eurocrypt 2002. :65-82.
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M.  2004.  A generic construction for intrusion-resilient public-key encryption. Topics in Cryptology–CT-RSA 2004. :1997-1997.
Dodis Y, Katz J, Reyzin L, Smith A.  2006.  Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
Doan K, Plaisant C, Shneiderman B.  1995.  QUERY PREVIEWS IN NETWORKED INFORMATION SYSTEMS. Institute for Systems Research Technical Reports.
Doan K, Plaisant C, Shneiderman B, Bruns T.  1997.  Query previews for networked information systems: a case study with NASA environmental data. SIGMOD Record. 26(1):75-81.
Djikeng A, Raverdy S, Foster JS, Bartholomeu D, Zhang Y, El-Sayed NM, Carlow C.  2007.  Cofactor-independent phosphoglycerate mutase is an essential gene in procyclic form Trypanosoma brucei. Parasitology research. 100(4):887-892.
Dix A, Jones W, Czerwinski M, Teevan J, Plaisant C, Moran TP.  2005.  The Challenge of Personal Information Management. INTERACT'05: Communicating Naturally through Computers (Adjunct Proceedings).
Dix J, Kuter U, Nau DS.  2003.  Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
Dix J, Kraus S, V.S. Subrahmanian.  2001.  Temporal agent programs. Artificial Intelligence. 127(1):87-135.
Dix J, Muñoz-Avila H, Nau DS, Zhang L.  2002.  Planning in a multi-agent environment: theory and practice. :944-945.
Dix J, Kraus S, V.S. Subrahmanian.  2002.  Agents dealing with time and uncertainty. Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2. :912-919.
Dix J, Muñoz-Avila H, Nau DS, Zhang L.  2003.  IMPACTing SHOP: Putting an AI Planner Into a Multi-Agent Environment. Annals of Mathematics and Artificial Intelligence. 37(4):381-407.
Dix J, Kuter U, Nau DS.  2002.  HTN Planning in Answer Set Programming. UMIACS-TR-2002-18
Dix J, Munoz-Avila H, Nau DS, Zhang L.  2002.  Theoretical and Empirical Aspects of a Planner in a Multi-agent Environment. Logics in Artificial Intelligence. 2424:173-185.
Dingermann T, Sharp S, Appel B, DeFranco D, Mount SM, Heiermann R, Pongs O, Söll D.  1981.  Transcription of cloned tRNA and 5S RNA genes in a Drosophila cell free extract. Nucleic Acids ResearchNucl. Acids Res.. 9(16):3907-3918.

Pages