Publications

Export 564 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is E  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
J
Johnson CN, Bowers JC, Griffitt KJ, Molina V, Clostio RW, Pei S, Laws E, Paranjpye RN, Strom MS, Chen A et al..  2012.  Ecology of Vibrio parahaemolyticus and Vibrio vulnificus in the Coastal and Estuarine Waters of Louisiana, Maryland, Mississippi, and Washington (United States). Applied and Environmental Microbiology. (20):7249-7257.
Jones T, Shneiderman B.  1990.  Examining usability for a training-oriented hypertext: Can hyper-activity be good? Electronic Publishing. 3(4):207-225.
Joshi K, Cukier M, Sanders W.  2002.  Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. Dependable Computing EDCC-4. 2485:644-648.
Jung JY, Reggia JA.  2006.  Evolutionary design of neural network architectures using a descriptive encoding language. Evolutionary Computation, IEEE Transactions on. 10(6):676-688.
K
Kanagal B, Deshpande A.  2009.  Ef?cient Query Evaluation over Temporally Correlated Probabilistic Streams IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :1315-1318.
Kandogan E, Shneiderman B.  1998.  Elastic windows: design, implementation, and evaluation of multi‐window operations. Software: Practice and Experience. 28(3):225-248.
Kandogan E, Shneiderman B.  1997.  Elastic Windows: a hierarchical multi-window World-Wide Web browser. Proceedings of the 10th annual ACM symposium on User interface software and technology. :169-177.
Kandogan E, Shneiderman B.  1996.  Elastic windows: improved spatial layout and rapid multiple window operations. Proceedings of the workshop on Advanced visual interfaces. :29-38.
Kandogan E, Shneiderman B.  1997.  Elastic Windows: evaluation of multi-window operations. Proceedings of the SIGCHI conference on Human factors in computing systems. :250-257.
Kang H, Shneiderman B.  2005.  Exploring Personal Media: A Spatial Interface Supporting User-Defined Semantic Regions (2004). Institute for Systems Research Technical Reports.
Kang H, Shneiderman B.  2006.  Exploring personal media: A spatial interface supporting user-defined semantic regions. Journal of Visual Languages & Computing. 17(3):254-283.
Kanungo T, Mount D, Netanyahu NS, Piatko CD, Silverman R, Wu AY.  2002.  An efficient k-means clustering algorithm: analysis and implementation. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 24(7):881-892.
Karr A, Porter A, Votta L.  1996.  An empirical exploration of code evolution. International Workshop on Empirical Studies of Software Maintenance.
Katz J.  2003.  Efficient and non-malleable proofs of plaintext knowledge and applications. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques. :211-228.
Katz J.  2007.  Efficient cryptographic protocols based on the hardness of learning parity with noise. Proceedings of the 11th IMA international conference on Cryptography and coding. :1-15.
Katz J, Koo C-Y.  2009.  On expected constant-round protocols for Byzantine agreement. Journal of Computer and System Sciences. 75(2):91-112.
Katz J.  2002.  Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks.
Katz J, Wang N.  2003.  Efficiency improvements for signature schemes with tight security reductions. Proceedings of the 10th ACM conference on Computer and communications security. :155-164.
Katz J, Ostrovsky R, Yung M.  2001.  Efficient password-authenticated key exchange using human-memorable passwords. Advances in Cryptology—EUROCRYPT 2001. :475-494.
Katz J, Trevisan L.  2000.  On the efficiency of local decoding procedures for error-correcting codes. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :80-86.
Katz J, Ostrovsky R, Yung M.  2009.  Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.
Katz J, Koo CY.  2006.  On expected constant-round protocols for Byzantine agreement. Advances in Cryptology-CRYPTO 2006. :445-462.
Kearsley G, Shneiderman B.  1998.  Engagement Theory: A Framework for Technology-Based Teaching and Learning.. Educational TechnologyEducational Technology. 38(5):20-23.
Kee H, Bhattacharyya SS, Kornerup J.  2010.  Efficient static buffering to guarantee throughput-optimal FPGA implementation of synchronous dataflow graphs. 2010 International Conference on Embedded Computer Systems (SAMOS). :136-143.
Keleher PJ, Hollingsworth J, Perkovic D.  1999.  Exposing Application Alternatives. Distributed Computing Systems, International Conference on. :0384-0384.

Pages