Publications

Export 927 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Book Chapters
Farwell D, Dorr BJ, Habash N, Helmreich S, Hovy E, Green R, Levin L, Miller K, Mitamura T, Rambow O et al..  2009.  Interlingual annotation of multilingual text corpora and FrameNet. Multilingual FrameNets in Computational LexicographyMultilingual FrameNets in Computational Lexicography. 200:287-318.
Bazinet AL, Cummings MP.  2008.  The Lattice Project: a Grid research and production environment combining multiple Grid computing models. Distributed & Grid Computing — Science Made Transparent for Everyone. Principles, Applications and Supporting CommunitiesDistributed & Grid Computing — Science Made Transparent for Everyone. Principles, Applications and Supporting Communities. :2-13.
Cook D, Faber V, Marathe M, Srinivasan A, Sussmann Y.  1998.  Low-bandwidth routing and electrical power networks. Automata, Languages and ProgrammingAutomata, Languages and Programming. 1443:604-615.
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H.  2008.  Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H.  2008.  Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H.  2008.  Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
Papamanthou C, Tollis IG.  2007.  Parameterized st-Orientations of Graphs: Algorithms and Experiments. Graph Drawing. :220-233.
Shen E, Elaine Shi, Waters B.  2009.  Predicate Privacy in Encryption Systems. Theory of Cryptography. 5444:457-473.
Wang L, Deshpande A.  2008.  Predictive Modeling-Based Data Collection in Wireless Sensor Networks. Wireless Sensor NetworksWireless Sensor Networks. 4913:34-51.
Srinivasan A.  2007.  Randomized Algorithms and Probabilistic Analysis in Wireless Networking. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. 4665:54-57.
Pemmaraju S, Srinivasan A.  2008.  The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
Hicks MW, Weirich S, Crary K.  2001.  Safe and Flexible Dynamic Linking of Native Code. Types in Compilation. 2071:147-176.
Albanese M, Turaga P, Chellappa R, Pugliese A, Subrahmanian V.  2010.  Semantic Video Content Analysis. Video Search and MiningVideo Search and Mining. 287:147-176.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2009.  Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
Turaga P, Veeraraghavan A, Srivastava A, Chellappa R.  2010.  Statistical Analysis on Manifolds and Its Applications to Video Analysis. Video Search and MiningVideo Search and Mining. 287:115-144.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
Papamanthou C, Tamassia R.  2007.  Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Information and Communications Security. :1-15.
Nguyen H V, Banerjee A, Burlina P, Broadwater J, Chellappa R.  2011.  Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.
Schlesinger JD, Okurowski ME, Conroy JM, O'Leary DP, Taylor A, Hobbs J, Wilson HT.  2002.  Understanding Machine Performance in the Context of Human Performance for Multi-document Summarization. DUC 02 Conference ProceedingsDUC 02 Conference Proceedings.
desJardins M, Getoor L, Koller D.  2000.  Using Feature Hierarchies in Bayesian Network Learning. Abstraction, Reformulation, and Approximation. 1864:260-270.
Bolle R, Aloimonos Y, Fermüller C.  1996.  Video representations. Recent Developments in Computer Vision. 1035:33-41.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.

Pages