Publications
Export 377 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is Y [Clear All Filters]
2004. IDeixis–Searching the Web with Mobile Images for Location-Based Information. Mobile Human-Computer Interaction–MobileHCI 2004. :61-125.
2006. IDiexis: Mobile image-based search on world wide web-a picture is worth a thousand keywords. Proc. of Mobisys.
2011. Impossibility of blind signatures from one-way permutations. Theory of Cryptography. :615-629.
2004. Improved Multiuser Detectors Employing Genetic Algorithms in a Space-Time Block Coded System, Yinggang Du and Kam Tai Chan. Signal. 2004(5):640-648.
2009. The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking. ACM Trans. Comput.-Hum. Interact.. 16(2):8:1-8:28.
2005. Interpretation of state sequences in HMM for activity representation. Proc. IEEE Conf. Acoustic Speech and Signal Processing. 2:709-712.
2012. InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
2012. InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
2010. Iterative execution-feedback model-directed GUI testing. Information and Software Technology. 52(5):559-575.
2005. Johns Hopkins summer workshop final report on parsing and spoken structural event detection. Johns Hopkins University, Tech. Rep.
2009. Language Identification for Handwritten Document Images Using AShape Codebook. Pattern Recognition. 42:3184-3191.
2000. Learned models for estimation of rigid and articulated human motion from stationary or moving camera. International Journal of Computer Vision. 36(1):5-30.
2010. Learning algorithms for link prediction based on chance constraints. Machine Learning and Knowledge Discovery in Databases. :344-360.
2011. Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
2011. Limits on the power of zero-knowledge proofs in cryptographic constructions. Theory of Cryptography. :559-578.
1994. The linear algebra of block quasi-newton algorithms. Linear Algebra and its Applications. 212–213:153-168.
2002. Media Conversion from Visual to Audio: Voice Browsers. Technical Reports of the Computer Science Department.
2014. Microbial Community Profiling of Human Saliva Using Shotgun Metagenomic Sequencing. PLoS ONE. (5):e97699.
2004. A Model-based Distributed Continuous Quality Assurance Process to Enhance the Quality of Service of Evolving Performance-intensive Software Systems. Proceedings of the 2nd ICSE Workshop on Remote Analysis and Measurement of Software Systems (RAMSS), Edinburgh, Scotland, UK.
2016. Modeling Sustainability: Population, Inequality, Consumption, and Bidirectional Coupling of the Earth and Human Systems. National Science Review. :nww081.
2006. Molecular Characterization of Serine-, Alanine-, and Proline-Rich Proteins of Trypanosoma cruzi and Their Possible Role in Host Cell Infection. Infect. Immun.. 74(3):1537-1546.