Publications

Export 1435 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Journal Articles
Zhou S, Krueger V, Chellappa R.  2003.  Probabilistic recognition of human faces from video. Computer Vision and Image Understanding. 91(1–2):214-245.
Deligiannakis A, Kotidis Y, Roussopoulos N.  2006.  Processing approximate aggregate queries in wireless sensor networks. Information Systems. 31(8):770-792.
Beynon M, Chang C, Catalyurek U, Kurc T, Sussman A, Andrade H, Ferreira R, Saltz J.  2002.  Processing large-scale multi-dimensional data in parallel and distributed environments. Parallel Computing. 28(5):827-859.
Khuller S, Mitchell SG, Vazirani VV.  1992.  Processor efficient parallel algorithms for the two disjoint paths problem and for finding a Kuratowski homeomorph. SIAM Journal on Computing. 21:486-486.
Ateniese G, Kamara S, Katz J.  2009.  Proofs of storage from homomorphic identification protocols. Advances in Cryptology–ASIACRYPT 2009. :319-333.
Ateniese G, Kamara S, Katz J.  2009.  Proofs of storage from homomorphic identification protocols. Advances in Cryptology–ASIACRYPT 2009. :319-333.
Khan Z, Bloom JS, Garcia BA, Singh M, Kruglyak L.  2009.  Protein quantification across hundreds of experimental conditions. Proceedings of the National Academy of Sciences. 106(37):15544-15548.
Khan Z, Bloom JS, Garcia BA, Singh M, Kruglyak L.  2009.  Protein quantification across hundreds of experimental conditions. Proceedings of the National Academy of Sciences. 106(37):15544-15548.
Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2007.  Provable algorithms for joint optimization of transport, routing and MAC layers in wireless ad hoc networks. Proc. DialM-POMC Workshop on Foundations of Mobile Computing.
Kuah B-T, Shneiderman B.  1998.  Providing Advisory Notices for UNIX Command Users: Design, Implementation, and Empirical Evaluations. Technical Reports of the Computer Science Department.
Katz J.  2010.  Public-Key Cryptography. Handbook of Information and Communication Security. :21-34.
Khan Z, Bloom JS, Amini S, Singh M, Perlman DH, Caudy AA, Kruglyak L.  2012.  Quantitative measurement of allele‐specific protein expression in a diploid yeast hybrid by LC‐MS. Molecular Systems Biology. 8(1)
Khan Z, Bloom JS, Amini S, Singh M, Perlman DH, Caudy AA, Kruglyak L.  2012.  Quantitative measurement of allele‐specific protein expression in a diploid yeast hybrid by LC‐MS. Molecular Systems Biology. 8(1)
Le ST, Guros NB, Bruce RC, Cardone A, Amin ND, Zhang S, Klauda J, Pant HC, Richter CA, Balijepalli A.  2019.  Quantum Capacitance-Limited MoS2 Biosensors Enable Remote Label-Free Enzyme Measurements. Nanoscale.
Bleiholder J, Khuller S, Naumann F, Raschid L, Wu Y.  2006.  Query planning in the presence of overlapping sources. Advances in Database Technology-EDBT 2006. :811-828.
Bleiholder J, Khuller S, Naumann F, Raschid L, Wu Y.  2006.  Query planning in the presence of overlapping sources. Advances in Database Technology-EDBT 2006. :811-828.
Jimmy Lin, Katz B.  2003.  Question answering techniques for the World Wide Web. Tutorial presentation at The 11th Conference of the European Chapter of the Association of Computational Linguistics (EACL-2003).
Huang Y, Katz J, Evans D.  2012.  Quid Pro Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. IEEE Symposium on Security and Privacy.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2006.  Ranking search results in P2P systems. Technical Report, CR-TR-4779, Department of Computer Science, University of Maryland.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2006.  Ranking search results in peer-to-peer systems. Technical Reports from UMIACS.
Le ST, Morris MA, Cardone A, Guros NB, Klauda JB, Sperling BA, Richter CA, Pant HC, Balijepalli A.  2020.  Rapid, quantitative therapeutic screening for Alzheimer's enzymes enabled by optimal signal transduction with transistors. The Analyst. 145(8):2925-2936.
Dunne C, Shneiderman B, Gove R, Klavans J, Dorr BJ.  2011.  Rapid understanding of scientific paper collections: integrating statistics, text analysis, and visualization. University of Maryland, Human-Computer Interaction Lab Tech Report HCIL-2011.
Katz J.  1989.  Rational Common Ground in the Sociology of Knowledge. Philosophy of the social sciences. 19(3):257-271.
Gordon S, Katz J.  2006.  Rational secret sharing, revisited. Security and Cryptography for Networks. :229-241.
Kim K, Chalidabhongse TH, Harwood D, Davis LS.  2005.  Real-time foreground-background segmentation using codebook model. Real-time imaging. 11(3):172-185.

Pages