Publications
Export 1435 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
1997. Comments on "Towards a framework for software measurement validation". Software Engineering, IEEE Transactions on. 23(3):187-189.
2003. Combining multiple evidences for gait recognition. Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on. 3:III-33-6vol.3-III-33-6vol.3.
2009. Collusion-free multiparty computation in the mediated model. Advances in Cryptology-CRYPTO 2009. :524-540.
2007. Colluding Fingerprinted Video using the Gradient Attack. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-161-II-164-II-161-II-164.
2011. Collective graph identification. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. :87-95.
2012. Collecting Semantic Similarity Ratings to Connect Concepts in Assistive Communication Tools. Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures. 370:81-93.
1997. Collabcad: A toolkit for integrated synchronous and asynchronous sharing of cad applications. Proceedings TeamCAD: GVU/NIST Workshop on Collaborative Design, Atlanta, GA, USA. :131-137.
2010. Coherent turbulent motions in a Mach 3 boundary layer. Bulletin of the American Physical Society. 55
1995. Code generation for multiple mappings. Frontiers of Massively Parallel Computation, 1995. Proceedings. Frontiers '95., Fifth Symposium on the. :332-341.
2011. Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1(1)
2000. Chromosome Identification Using Hidden Markov Models: Comparison with Neural Networks, Singular Value Decomposition, Principal Components Analysis, and Fisher Discriminant Analysis. Laboratory Investigation. 80(11):1629-1641.
2007. Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.
2004. Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. :207-222.
2000. A chosen ciphertext attack against several e-mail encryption protocols. Ninth USENIX Security Symposium.
2007. Chit-based access control.
2011. CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
2011. CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.