Publications
Export 1435 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is K [Clear All Filters]
2010. Making sense of archived e‐mail: Exploring the Enron collection with NetLens. Journal of the American Society for Information Science and Technology. 61(4):723-744.
2010. Mesh saliency and human eye fixations. ACM Transactions on Applied Perception (TAP). 7(2):12:1–12:13-12:1–12:13.
2010. Natural language annotations for the Semantic Web. On the Move to Meaningful Internet Systems 2002: CoopIS, DOA, and ODBASE. :1317-1331.
2010. New forms of Human-Computer Interaction for Visualizing Information. Information Visualization.
2010. A new framework for efficient password-based authenticated key exchange. Proceedings of the 17th ACM conference on Computer and communications security. :516-525.
2010. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
2010. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
2010. Parallel and concurrent security of the HB and HB+ protocols. Journal of cryptology. 23(3):402-421.
2010. Partial fairness in secure two-party computation. Advances in Cryptology–EUROCRYPT 2010. :157-176.
2010. Perturbing the Ubiquitin Pathway Reveals How Mitosis Is Hijacked to Denucleate and Regulate Cell Proliferation and Differentiation In Vivo. PLoS ONEPLoS ONE. 5(10):e13331-e13331.
2010. The power of protein interaction networks for associating genes with diseases. Bioinformatics. 26(8):1057-1057.
2010. Rapid prototyping for digital signal processing systems using Parameterized Synchronous Dataflow graphs. 2010 21st IEEE International Symposium on Rapid System Prototyping (RSP). :1-7.
2010. REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):87-87.
2010. REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):87-87.
2010. Resource-Aware Compiler Prefetching for Many-Cores. Parallel and Distributed Computing (ISPDC), 2010 Ninth International Symposium on. :133-140.
2010. Scalable representation of dataflow graph structures using topological patterns. 2010 IEEE Workshop on Signal Processing Systems (SIPS). :13-18.
2010. Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.
2010. Special Section on Distributed Camera Networks: Sensing, Processing, Communication, and Implementation. Image Processing, IEEE Transactions on. 19(10):2513-2515.
2010. The state of visual analytics: Views on what visual analytics is and where it is going. 2010 IEEE Symposium on Visual Analytics Science and Technology (VAST). :257-259.