Publications
Export 1734 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is M [Clear All Filters]
2004. Using Trust in Recommender Systems: An Experimental Analysis. Trust ManagementTrust Management. 2995:221-235.
2009. Triangle Inequality and Routing Policy Violations in the Internet. Passive and Active Network MeasurementPassive and Active Network Measurement. 5448:45-54.
2011. Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.
2002. Theoretical and Empirical Aspects of a Planner in a Multi-agent Environment. Logics in Artificial Intelligence. 2424:173-185.
1999. Text in 3D+ time. Readings in information visualizationReadings in information visualization. :451-451.
1999. Text in 3D. Readings in information visualizationReadings in information visualization. :440-441.
1999. Text in 2D. Readings in information visualizationReadings in information visualization. :431-431.
1999. Text in 1D. Readings in information visualizationReadings in information visualization. :411-412.
2009. TESTING EVENT-DRIVEN SOFTWARE–THE NEXT QA CHALLENGE? Software Engineering and DevelopmentSoftware Engineering and Development. :187-187.
1995. The SVD in Image Restoration. SVD and Signal Processing III: Algorithms, Architectures, and ApplicationsSVD and Signal Processing III: Algorithms, Architectures, and Applications. :315-322.
1994. Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
2009. Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
2011. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
2005. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
2005. A process and role-based taxonomy of techniques to make testable COTS components. Testing Commercial-Off-The-Shelf Components And SystemsTesting Commercial-Off-The-Shelf Components And Systems. :109-140.
2005. Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
1992. On the Precise Loop Transfer Recovery and Transmission Zeroes. First IEEE Conference on Control ApplicationsFirst IEEE Conference on Control Applications.
2003. The people in digital libraries: Multifaceted approaches to assessing needs and impact. Digital library use: Social practice in design and evaluationDigital library use: Social practice in design and evaluation. :119-160.
1999. Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
2008. Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
2010. Optimal Authenticated Data Structures with Multilinear Forms. Pairing-Based Cryptography - Pairing 2010. :246-264.
2010. New Approaches to Robust, Point-Based Image Registration. Image Registration for Remote SensingImage Registration for Remote Sensing.
1999. Network Programming Using PLAN. Internet Programming LanguagesInternet Programming Languages. 1686:127-143.
2010. Modelling Type 1a Supernova Light Curves. Exponential Data Fitting and Its ApplicationsExponential Data Fitting and Its Applications. :169-186.