Publications
Export 748 results:
Author Title [ Type] Year Filters: First Letter Of Title is S [Clear All Filters]
1993. Scheduling home control devices: a case study of the transition from the research project to a product. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :205-205.
2005. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
2011. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
2012. Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
2003. Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
2004. Selective refinement on nested tetrahedral meshes. Geometric Modeling for Scientific VisualizationGeometric Modeling for Scientific Visualization. :329-344.
2010. Sequencing and Genome Assembly Using Next-Generation Technologies. Computational BiologyComputational Biology. 673:1-17.
2009. Shape Matching for Foliage Database Retrieval. Semantic Mining Technologies for Multimedia DatabasesSemantic Mining Technologies for Multimedia Databases. :100-100.
2006. Silhouette-Based Approaches. Human Identification Based on GaitHuman Identification Based on Gait. :45-105.
2009. Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
1998. Simultaneous estimation of viewing geometry and structure. Computer Vision — ECCV'98Computer Vision — ECCV'98. 1406:342-358.
2004. Social and psychological influences on computer user frustration. Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use. :91-103.
2005. Software defect reduction top 10 list. Foundations of empirical software engineering: the legacy of Victor R. Basili. :426-426.
1994. Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
1994. Some Themes in Gene H.Golub's Work on Iterative Methods. Recent Advances in Iterative MethodsRecent Advances in Iterative Methods. 60:1-11.
1996. Spatiotemporal representations for visual navigation. Computer Vision — ECCV '96Computer Vision — ECCV '96. 1064:671-684.
2011. Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
1995. Starfield visualization with interactive smooth zooming. Visual database systems, IIIVisual database systems, III. 3:1-1.