Publications
Export 1435 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is K [Clear All Filters]
2008. Streaming algorithms for k-center clustering with outliers and with anonymity. Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. :165-178.
2008. Structural Sampling for Statistical Software Testing. Probabilistic, Logical and Relational Learning-A Further Synthesis.
2008. Tracking Down Under: Following the Satin Bowerbird. Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on. :1-7.
2008. Trade-offs in matching jobs and balancing load for distributed desktop grids. Future Generation Computer Systems. 24(5):415-424.
2008. Trade-offs in matching jobs and balancing load for distributed desktop grids. Future Generation Computer Systems. 24(5):415-424.
2008. Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Transactions on Information Systems (TOIS). 27(1):3:1–3:27-3:1–3:27.
2008. Uncovering Genomic Reassortments among Influenza Strains by Enumerating Maximal Bicliques. IEEE International Conference on Bioinformatics and Biomedicine, 2008. BIBM '08. :223-230.
2008. Universally composable multi-party computation with an unreliable common reference string. Theory of Cryptography. :142-154.
2008. Users can change their web search tactics: Design guidelines for categorized overviews. Information Processing & Management. 44(2):463-484.
2008. Using wearable sensors and real time inference to understand human recall of routine activities. Proceedings of the 10th international conference on Ubiquitous computing. :154-163.
2008. Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
2008. Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
2008. Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
2008. Who killed the directed model? Computer Vision and Pattern Recognition, IEEE Computer Society Conference on. :1-8.
2007. On achieving the "best of both worlds" in secure multiparty computation. Proceedings of the thirty-ninth annual ACM symposium on Theory of computing. :11-20.
2007. Active semantic caching to optimize multidimensional data analysis in parallel and distributed environments. Parallel Computing. 33(7-8):497-520.
2007. Barrier pointing: using physical edges to assist target acquisition on mobile device touch screens. Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, October. :15-17.
2007. Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls. ACM Transactions on Embedded Computing Systems (TECS). 6(2):14–es-14–es.
2007. Capture, annotate, browse, find, share: novel interfaces for personal photo management. International Journal of Human-] Computer Interaction. 23(3):315-337.
2007. Chit-based access control.