Publications
Export 927 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is W [Clear All Filters]
2009. Interlingual annotation of multilingual text corpora and FrameNet. Multilingual FrameNets in Computational LexicographyMultilingual FrameNets in Computational Lexicography. 200:287-318.
2008. The Lattice Project: a Grid research and production environment combining multiple Grid computing models. Distributed & Grid Computing — Science Made Transparent for Everyone. Principles, Applications and Supporting CommunitiesDistributed & Grid Computing — Science Made Transparent for Everyone. Principles, Applications and Supporting Communities. :2-13.
1998. Low-bandwidth routing and electrical power networks. Automata, Languages and ProgrammingAutomata, Languages and Programming. 1443:604-615.
2011. Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
2008. Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
2008. Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
2008. Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
2008. Predictive Modeling-Based Data Collection in Wireless Sensor Networks. Wireless Sensor NetworksWireless Sensor Networks. 4913:34-51.
2007. Randomized Algorithms and Probabilistic Analysis in Wireless Networking. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. 4665:54-57.
2008. The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
2009. Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
2010. Statistical Analysis on Manifolds and Its Applications to Video Analysis. Video Search and MiningVideo Search and Mining. 287:115-144.
2003. Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
2007. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Information and Communications Security. :1-15.
2011. Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.
2002. Understanding Machine Performance in the Context of Human Performance for Multi-document Summarization. DUC 02 Conference ProceedingsDUC 02 Conference Proceedings.
2000. Using Feature Hierarchies in Bayesian Network Learning. Abstraction, Reformulation, and Approximation. 1864:260-270.