Publications
Export 1377 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is R [Clear All Filters]
1997. Semantic query optimization for object databases. Data Engineering, 1997. Proceedings. 13th International Conference on. :444-453.
1997. Semantic query optimization for object databases. Data Engineering, 1997. Proceedings. 13th International Conference on. :444-453.
1993. Semantic classes and syntactic ambiguity. Proceedings of the workshop on Human Language Technology. :278-283.
2004. Semantic Annotation for Interlingual Representation of Multilingual Texts. Workshop Programme. :19-19.
2004. Semantic Annotation for Interlingual Representation of Multilingual Texts. Workshop Programme. :19-19.
2004. Semantic annotation and lexico-syntactic paraphrase. Proceedings of the 4th International Conference on Language Resources and Evaluation (LREC) Workshop on Building Lexical Resources from Semantically Annotated Corpora. :47-52.
1998. Self-replicating structures: evolution, emergence, and computation. Artificial Life. 4(3):283-302.
1988. Self-processing networks and their biomedical implications. Proceedings of the IEEE. 76(6):680-692.
1983. A self-describing meta-schema for the RM/T data model. IEEE Workshop On Languages for Automation, IEEE Computer Society Press.
1997. Selectional preference and sense disambiguation. Proceedings of the ACL SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How. :52-57.
1996. Selectional constraints: an information-theoretic model and its computational realization. Cognition. 61(1-2):127-159.
1985. SEES—A Software testing Environment Support System. IEEE Transactions on Software Engineering. SE-11(4):355-366.
2008. Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.
2005. Secure requirements elicitation through triggered message sequence charts. Distributed Computing and Internet Technology. :273-282.
2012. Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
2011. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
2010. Secure and robust iris recognition using random projections and sparse representations. Pattern Analysis and Machine Intelligence, IEEE Transactions on. (99):1-1.
2010. Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.