Publications

Export 1435 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Bowen D, Mayergoyz ID, Krafft C, Kroop D.  2010.  Common Mode Analysis of Ethernet Transformers. Magnetics Letters, IEEE. 1
Morasca S, Briand LC, Basili VR, Weyuker EJ, Zelkowitz MV, Kitchenham B, Lawrence Pfleeger S, Fenton N.  1997.  Comments on "Towards a framework for software measurement validation". Software Engineering, IEEE Transactions on. 23(3):187-189.
Cuntoor N, Kale A, Chellappa R.  2003.  Combining multiple evidences for gait recognition. Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on. 3:III-33-6vol.3-III-33-6vol.3.
Gerevini A, Kuter U, Nau DS, Saetti A, Waisbrot N.  2008.  Combining Domain-Independent Planning and HTN Planning: The Duet Planner. :573-577.
Hannenhalli S, Hubbell E, Lipshutz R, Pevzner P.  2002.  Combinatorial Algorithms for Design of DNA Arrays. Chip TechnologyChip Technology. 77:1-19.
Hannenhalli S, Hubbell E, Lipshutz R, Pevzner P.  2002.  Combinatorial Algorithms for Design of DNA Arrays. Chip TechnologyChip Technology. 77:1-19.
Hannenhalli S, Hubbell E, Lipshutz R, Pevzner P.  2002.  Combinatorial Algorithms for Design of DNA Arrays. Chip TechnologyChip Technology. 77:1-19.
Khuller S.  1990.  Coloring algorithms for K5-minor free graphs. Information Processing Letters. 34(4):203-208.
Alwen J, Katz J, Lindell Y, Persiano G, Shelat A, Visconti I.  2009.  Collusion-free multiparty computation in the mediated model. Advances in Cryptology-CRYPTO 2009. :524-540.
He S, Kirovski D, M. Wu.  2007.  Colluding Fingerprinted Video using the Gradient Attack. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-161-II-164-II-161-II-164.
Namata G M, Kok S, Getoor L.  2011.  Collective graph identification. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. :87-95.
Nikolova S, Boyd-Graber J, Fellbaum C.  2012.  Collecting Semantic Similarity Ratings to Connect Concepts in Assistive Communication Tools. Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures. 370:81-93.
Mishra P, Varshney A, Kaufman A.  1997.  Collabcad: A toolkit for integrated synchronous and asynchronous sharing of cad applications. Proceedings TeamCAD: GVU/NIST Workshop on Collaborative Design, Atlanta, GA, USA. :131-137.
Beekman I, Kan YC, Priebe S, Martin, M.P.  2010.  Coherent turbulent motions in a Mach 3 boundary layer. Bulletin of the American Physical Society. 55
Kelly W, Pugh W, Rosser E.  1995.  Code generation for multiple mappings. Frontiers of Massively Parallel Computation, 1995. Proceedings. Frontiers '95., Fifth Symposium on the. :332-341.
Alam M, Islam A, Bhuiyan NA, Rahim N, Hossain A, Khan GY, Ahmed D, Watanabe H, Izumiya H, Faruque ASG et al..  2011.  Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1(1)
Flach P, Matsubara ET, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  On classification, ranking, and probability estimation.
Conroy JM, Kolda TG, O'Leary DP, O'Leary TJ.  2000.  Chromosome Identification Using Hidden Markov Models: Comparison with Neural Networks, Singular Value Decomposition, Principal Components Analysis, and Fisher Discriminant Analysis. Laboratory Investigation. 80(11):1629-1641.
Dodis Y, Katz J.  2005.  Chosen-ciphertext security of multiple encryption. Theory of Cryptography. :188-209.
Boneh D, Canetti R, Halevi S, Katz J.  2007.  Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.
Canetti R, Halevi S, Katz J.  2004.  Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. :207-222.
Katz J, Schneier B.  2000.  A chosen ciphertext attack against several e-mail encryption protocols. Ninth USENIX Security Symposium.
Keleher PJ, Spring N, Bhattacharjee B.  2007.  Chit-based access control.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.

Pages