Publications

Export 1435 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Consolvo S, McDonald DW, Toscos T, Chen MY, Froehlich J, Harrison B, Klasnja P, LaMarca A, LeGrand L, Libby R et al..  2008.  Activity sensing in the wild: a field trial of ubifit garden. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1797-1806.
Kochut A, Agrawala AK, Larsen RL, Shankar UA.  2002.  AD (Attacker Defender) Game. Technical Reports from UMIACS, UMIACS-TR-2001-45.
Krishnamurthy S, Sanders WH, Cukier M.  2002.  An adaptive framework for tunable consistency and timeliness using replication. :17-26.
Hajiaghayi MT, Kleinberg R, Parkes DC.  2004.  Adaptive limited-supply online auctions. Proceedings of the 5th ACM Conference on Electronic Commerce. :71-80.
Krishnamurthy S, Sanders WH, Cukier M.  2003.  An adaptive quality of service aware middleware for replicated services. Parallel and Distributed Systems, IEEE Transactions on. 14(11):1112-1125.
Gopalakrishnan V, Silaghi B, Bhattacharjee B, Keleher P.  2004.  Adaptive replication in peer-to-peer systems. Distributed Computing Systems, 2004. Proceedings. 24th International Conference on. :360-369.
Karagol-Ayan B, Doermann D, Weinberg A.  2006.  Adaptive Transformation-based Learning for Improving Dictionary Tagging. Proceedings of the 11th Conference on European Chapter of the Association for Computational Linguistics. :257-264.
Garay JA, Katz J, Kumaresan R, Zhou HS.  2011.  Adaptively secure broadcast, revisited. Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing.
Garay JA, Katz J, Kumaresan R, Zhou HS.  2011.  Adaptively secure broadcast, revisited. Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing.
Canetti R, Halevi S, Katz J.  2005.  Adaptively-secure, non-interactive public-key encryption. Theory of Cryptography. :150-168.
Canetti R, Halevi S, Katz J.  2004.  Adaptively-Secure, Non-Interactive Public-Key Encryption. Model reduction methods for vector autoregressive processes. :150-150.
W Easterday R, Kausrud KL, Star B, Heier L, Haley BJ, Ageyev V, Colwell RR, Stenseth NChr.  2012.  An additional step in the transmission of Yersinia pestis? The ISME Journal. (2):231-236.
Doermann D, Sauvola J, Haapakoski S, Kauniskangas H, Seppanen T, Pietikainen M.  1997.  ADistributed Management System for Testing Document Image Database Analysis Algorithms. ICDAR. :989-995.
Dix J, Kraus S, V.S. Subrahmanian.  2002.  Agents dealing with time and uncertainty. Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2. :912-919.
Ertugay O, Hicks MW, Smith J, Kornblum J.  2000.  Agents in Network Management. Technical Reports (CIS).
Sánchez JA, Etzioni O, Kautz H, Lieberman H, Shneiderman B.  1999.  Agents vs. direct manipulation: what's best to disentangle the Web? Proceedings of the eighth international conference on World Wide Web.
Sánchez AJ, Etzioni O, Kautz H, Lieberman H, Shneiderman B.  1999.  Agents vs. direct manipulation: what's best to disentangle the Web? Computer Networks: The International Journal of Computer and Telecommunications Networking. 31(11-16):1765-1767.
Katz J, Lindell A.  2008.  Aggregate message authentication codes. Topics in Cryptology–CT-RSA 2008. :155-169.
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
Shekhar C, Chellappa R.  2003.  Airborne Video Registration for Activity Monitoring. Video RegistrationVideo Registration. 5:130-143.
Kozen D, Teitelbaum T, Chen WZ, Field JH, Pugh W, Vander Zanden BT.  1987.  ALEX-an Alexical Programming Language. TR87-835
Kolda TG, O'Leary DP.  2000.  Algorithm 805: computation and uses of the semidiscrete matrix decomposition. ACM Trans. Math. Softw.. 26(3):415-435.
Kumar AVS, Marathe MV, Parthasarathy S, Srinivasan A.  2005.  Algorithmic aspects of capacity in wireless networks. Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :133-144.
Demaine ED, Hajiaghayi MT, Kawarabayashi K.  2005.  Algorithmic graph minor theory: Decomposition, approximation, and coloring. Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on. :637-646.

Pages