Publications

Export 1435 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2010
Raboin E, Nau DS, Kuter U, Gupta SK, Svec P.  2010.  Strategy generation in multi-agent imperfect-information pursuit games. :947-954.
Pei J, Getoor L, de Keijzer A.  2010.  Summary of the first ACM SIGKDD workshop on knowledge discovery from uncertain data (U'09). ACM SIGKDD Explorations Newsletter. 11(2):90-91.
Valancius V, Kim H, Feamster N.  2010.  Transit portal: BGP connectivity as a service. ACM SIGCOMM Computer Communication Review. 40(4):463-464.
Cheng KL, Zuckerman I, Kuter U, Nau DS.  2010.  Using a Social Orientation Model for the Evolution of Cooperative Societies. :431-438.
Zheleva E, Getoor L, Golbeck J, Kuter U.  2010.  Using friendship ties and family circles for link prediction. Advances in Social Network Mining and Analysis. :97-113.
Grinstein G, Konecni S, Scholtz J, Whiting M, Plaisant C.  2010.  VAST 2010 Challenge: Arms dealings and pandemics. Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on. :263-264.
Chetty M, Banks R, Harper R, Regan T, Sellen A, Gkantsidis C, Karagiannis T, Key P.  2010.  Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. SIGCHI '10. :659-668.
Chetty M, Banks R, Harper R, Regan T, Sellen A, Gkantsidis C, Karagiannis T, Key P.  2010.  Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. SIGCHI '10. :659-668.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
Vishnoi A, Kryazhimskiy S, Bazykin GA, Hannenhalli S, Plotkin JB.  2010.  Young Proteins Experience More Variable Selection Pressures Than Old Proteins. Genome ResearchGenome Res.. 20(11):1574-1581.
2009
Kingsford C, Nagarajan N, Salzberg SL.  2009.  2009 Swine-Origin Influenza A (H1N1) Resembles Previous Influenza Isolates. PLoS ONEPLoS ONE. 4(7):e6402-e6402.
Saha S, Kianzad V, Schlessman J, Aggarwal G, Bhattacharyya SS, Chellappa R, Wolf W.  2009.  An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
Alwen J, Katz J, Lindell Y, Persiano G, Shelat A, Visconti I.  2009.  Collusion-free multiparty computation in the mediated model. Advances in Cryptology-CRYPTO 2009. :524-540.
Chun J, Grim CJ, Hasan NA, Lee JH, Choi SY, Haley BJ, Taviani E, Jeon YS, Kim DW, Lee JH et al..  2009.  Comparative genomics reveals mechanism for short-term and long-term clonal transitions in pandemic Vibrio cholerae. Proceedings of the National Academy of Sciences. 106(36):15442-15447.
Gordon S, Katz J.  2009.  Complete fairness in multi-party computation without an honest majority. Theory of Cryptography. :19-35.
Di Bonaventura M P, DeSalle R, Pop M, Nagarajan N, Figurski DH, Fine DH, Kaplan JB, Planet PJ.  2009.  Complete Genome Sequence of Aggregatibacter (Haemophilus) Aphrophilus NJ8700. Journal of BacteriologyJ. Bacteriol.. 191(14):4693-4694.
Dodis Y, Katz J, Smith A, Walfish S.  2009.  Composability and on-line deniability of authentication. Theory of Cryptography. :146-162.
Klavans JL, Sheffield C, Abels E, Jimmy Lin, Passonneau R, Sidhu T, Soergel D.  2009.  Computational linguistics for metadata building (CLiMB): using text mining for the automatic identification, categorization, and disambiguation of subject terms for image metadata. Multimedia Tools and Applications. 42(1):115-138.
Li J, Deshpande A, Khuller S.  2009.  On Computing Compression Trees for Data Collection in Sensor Networks. arXiv:0907.5442.
Roussopoulos N, Karagiannis D.  2009.  Conceptual modeling: past, present and the continuum of the future. Conceptual Modeling: Foundations and Applications. :139-152.
Lapizco-Encinas G, Kingsford C, Reggia JA.  2009.  A cooperative combinatorial Particle Swarm Optimization algorithm for side-chain packing. IEEE Swarm Intelligence Symposium, 2009. SIS '09. :22-29.
Kornhauser D, Wilensky U, Rand W.  2009.  Design guidelines for agent based model visualization. Journal of Artificial Societies and Social Simulation. 12(2):1-1.
Hao S, Syed N A, Feamster N, Gray AG, Krasser S.  2009.  Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. Proceedings of the 18th conference on USENIX security symposium. :101-118.

Pages