Publications

Export 1435 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2008
Matthew McCutchen R, Khuller S.  2008.  Streaming algorithms for k-center clustering with outliers and with anonymity. Approximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. :165-178.
Baskiotis N, Sebag M, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  Structural Sampling for Statistical Software Testing. Probabilistic, Logical and Relational Learning-A Further Synthesis.
Gupta SK, Anand DK, Brough JE, Kavetsky RA, Schwartz M, Thakur A.  2008.  A Survey of the Virtual Environments-based Assembly Training Applications.
Au T-C, Kraus S, Nau DS.  2008.  Synthesis of strategies from interaction traces. :855-862.
Kembhavi A, Farrell R, Luo Y, Jacobs DW, Duraiswami R, Davis LS.  2008.  Tracking Down Under: Following the Satin Bowerbird. Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on. :1-7.
Kim J-S, Nam B, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2008.  Trade-offs in matching jobs and balancing load for distributed desktop grids. Future Generation Computer Systems. 24(5):415-424.
Kim J-S, Nam B, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2008.  Trade-offs in matching jobs and balancing load for distributed desktop grids. Future Generation Computer Systems. 24(5):415-424.
Zheleva E, Kolcz A, Getoor L.  2008.  Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Transactions on Information Systems (TOIS). 27(1):3:1–3:27-3:1–3:27.
Nagarajan N, Kingsford C.  2008.  Uncovering Genomic Reassortments among Influenza Strains by Enumerating Maximal Bicliques. IEEE International Conference on Bioinformatics and Biomedicine, 2008. BIBM '08. :223-230.
Goyal V, Katz J.  2008.  Universally composable multi-party computation with an unreliable common reference string. Theory of Cryptography. :142-154.
Kules B, Shneiderman B.  2008.  Users can change their web search tactics: Design guidelines for categorized overviews. Information Processing & Management. 44(2):463-484.
Klasnja P, Harrison BL, LeGrand L, LaMarca A, Froehlich J, Hudson SE.  2008.  Using wearable sensors and real time inference to understand human recall of routine activities. Proceedings of the 10th international conference on Ubiquitous computing. :154-163.
Sato T, Kameya Y, Kurihara K, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
Sato T, Kameya Y, Kurihara K, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
Sato T, Kameya Y, Kurihara K, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
Kingsford C, Salzberg SL.  2008.  What are decision trees? Nature biotechnology. 26(9):1011-1011.
Katz J.  2008.  Which languages have 4-round zero-knowledge proofs? Theory of Cryptography. :73-88.
Domke J, Karapurkar A, Aloimonos Y.  2008.  Who killed the directed model? Computer Vision and Pattern Recognition, IEEE Computer Society Conference on. :1-8.
2007
Katz J.  2007.  On achieving the "best of both worlds" in secure multiparty computation. Proceedings of the thirty-ninth annual ACM symposium on Theory of computing. :11-20.
Andrade H, Kurc T, Sussman A, Saltz J.  2007.  Active semantic caching to optimize multidimensional data analysis in parallel and distributed environments. Parallel Computing. 33(7-8):497-520.
Katz J, Yung M.  2007.  Applied cryptography and network security: 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007: proceedings. 4521
Froehlich J, Wobbrock JO, Kane SK.  2007.  Barrier pointing: using physical edges to assist target acquisition on mobile device touch screens. Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, October. :15-17.
Ko MY, Murthy PK, Bhattacharyya SS.  2007.  Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls. ACM Transactions on Embedded Computing Systems (TECS). 6(2):14–es-14–es.
Kang H, Bederson BB, Suh B.  2007.  Capture, annotate, browse, find, share: novel interfaces for personal photo management. International Journal of Human-] Computer Interaction. 23(3):315-337.
Keleher PJ, Spring N, Bhattacharjee B.  2007.  Chit-based access control.

Pages