Publications
Export 1435 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
2011. A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
2011. A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
1987. Computer-supported cooperative work (panel): is this REALLY a new field of research? Proceedings of the SIGCHI/GI conference on Human factors in computing systems and graphics interface. :227-228.
2010. On Computing Compression Trees for Data Collection in Wireless Sensor Networks. 2010 Proceedings IEEE INFOCOM. :1-9.
2007. Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10^30,000 worlds. Annals of Mathematics and Artificial Intelligence. 51(2):295-331.
1999. Computing nearest neighbors for moving points and applications to clustering. Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms. :931-932.
2007. Concept disambiguation for improved subject access using multiple knowledge sources. Proceedings of the Workshop on Language Technology for Cultural Heritage Data (LaTeCH 2007). :25-25.
1994. Concept-based lexical selection. Proceedings of the AAAI-94 Fall Symposium on Knowledge Representation for Natural Language Processing in Implemented Systems.
2009. Conceptual modeling: past, present and the continuum of the future. Conceptual Modeling: Foundations and Applications. :139-152.
2007. Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
2007. Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
2011. Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
2005. On constructing universal one-way hash functions from arbitrary one-way functions. Journal of Cryptology.
2005. On constructing universal one-way hash functions from arbitrary one-way functions. Journal of Cryptology.
2003. Construction of an efficient overlay multicast infrastructure for real-time applications. INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2:1521-1531vol.2-1521-1531vol.2.
2003. Construction of an efficient overlay multicast infrastructure for real-time applications. INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2:1521-1531vol.2-1521-1531vol.2.
2003. Construction of an efficient overlay multicast infrastructure for real-time applications. INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. 2:1521-1531vol.2-1521-1531vol.2.
2005. Content Index to Volume 18. INTERNATIONAL JOURNAL OF HUMAN–COMPUTER INTERACTION. 18(3):367-368.
1997. Content-based Image Retrieval Using Composite Features. Proceedings of the 1997 Scandinavian Conference on Image Analysis. :35-42.
2006. Contention-conscious transaction ordering in multiprocessor DSP systems. IEEE Transactions on Signal Processing. 54(2):556-569.