Publications
Export 564 results:
[ Author] Title Type Year Filters: First Letter Of Title is E [Clear All Filters]
2012. Ecology of Vibrio parahaemolyticus and Vibrio vulnificus in the Coastal and Estuarine Waters of Louisiana, Maryland, Mississippi, and Washington (United States). Applied and Environmental Microbiology. (20):7249-7257.
1990. Examining usability for a training-oriented hypertext: Can hyper-activity be good? Electronic Publishing. 3(4):207-225.
2002. Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. Dependable Computing EDCC-4. 2485:644-648.
2006. Evolutionary design of neural network architectures using a descriptive encoding language. Evolutionary Computation, IEEE Transactions on. 10(6):676-688.
2009. Ef?cient Query Evaluation over Temporally Correlated Probabilistic Streams IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :1315-1318.
1998. Elastic windows: design, implementation, and evaluation of multi‐window operations. Software: Practice and Experience. 28(3):225-248.
1997. Elastic Windows: a hierarchical multi-window World-Wide Web browser. Proceedings of the 10th annual ACM symposium on User interface software and technology. :169-177.
1996. Elastic windows: improved spatial layout and rapid multiple window operations. Proceedings of the workshop on Advanced visual interfaces. :29-38.
1997. Elastic Windows: evaluation of multi-window operations. Proceedings of the SIGCHI conference on Human factors in computing systems. :250-257.
2005. Exploring Personal Media: A Spatial Interface Supporting User-Defined Semantic Regions (2004). Institute for Systems Research Technical Reports.
2006. Exploring personal media: A spatial interface supporting user-defined semantic regions. Journal of Visual Languages & Computing. 17(3):254-283.
2002. An efficient k-means clustering algorithm: analysis and implementation. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 24(7):881-892.
1996. An empirical exploration of code evolution. International Workshop on Empirical Studies of Software Maintenance.
2003. Efficient and non-malleable proofs of plaintext knowledge and applications. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques. :211-228.
2007. Efficient cryptographic protocols based on the hardness of learning parity with noise. Proceedings of the 11th IMA international conference on Cryptography and coding. :1-15.
2009. On expected constant-round protocols for Byzantine agreement. Journal of Computer and System Sciences. 75(2):91-112.
2003. Efficiency improvements for signature schemes with tight security reductions. Proceedings of the 10th ACM conference on Computer and communications security. :155-164.
2001. Efficient password-authenticated key exchange using human-memorable passwords. Advances in Cryptology—EUROCRYPT 2001. :475-494.
2000. On the efficiency of local decoding procedures for error-correcting codes. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :80-86.
2009. Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.
2006. On expected constant-round protocols for Byzantine agreement. Advances in Cryptology-CRYPTO 2006. :445-462.
1998. Engagement Theory: A Framework for Technology-Based Teaching and Learning.. Educational TechnologyEducational Technology. 38(5):20-23.
2010. Efficient static buffering to guarantee throughput-optimal FPGA implementation of synchronous dataflow graphs. 2010 International Conference on Embedded Computer Systems (SAMOS). :136-143.
1999. Exposing Application Alternatives. Distributed Computing Systems, International Conference on. :0384-0384.