Publications

Export 112 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Title is W  [Clear All Filters]
2011
Stonedahl F, Anderson D, Rand W.  2011.  When does simulated data match real data? Proceedings of the 13th annual conference companion on Genetic and evolutionary computation. :231-232.
Chetty M, Haslem D, Baird A, Ofoha U, Sumner B, Grinter R.  2011.  Why is My Internet Slow?: Making Network Speeds Visible SIGCHI '11. :1889-1898.
Konte M, Feamster N.  2011.  Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
Castillo CD, Jacobs DW.  2011.  Wide-baseline stereo for face recognition with large pose variation. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :537-544.
Chung JM, Easley GR, O'Leary DP.  2011.  Windowed Spectral Regularization of Inverse Problems. SIAM Journal on Scientific Computing. 33(6)
2012
Pop M.  2012.  We are what we eat: how the diet of infants affects their gut microbiome. Genome Biology. 13(4)
Zelkowitz MV.  2012.  What have we learned about software engineering? Communications of the ACM. 55(2):38-39.
Stonedahl F, Rand W.  2012.  When Does Simulated Data Match Real Data? Comparing Model Calibration Functions using Genetic Algorithms World Congress on Social Simulation (WCSS), Taipei, Taiwan.
Katz J.  2012.  Which Languages Have 4-Round Zero-Knowledge Proofs? Journal of cryptology. 25(1):41-56.
Ricaldi JN, Fouts DE, Selengut JD, Harkins DM, Patra KP, Moreno A, Lehmann JS, Purushe J, Sanka R, Torres M et al..  2012.  Whole genome analysis of Leptospira licerasiae provides insight into leptospiral evolution and pathogenicity.. PLoS Negl Trop Dis. 6(10):e1853.
2013
Jutla A, Akanda AShafqat, Huq A, Faruque ASyed Golam, Colwell RR, Islam S.  2013.  A water marker monitored by satellites to predict seasonal endemic cholera. Remote Sensing Letters. 4472741982394456(8):822-831.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.

Pages