Publications
Export 1435 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is K [Clear All Filters]
2010. Summary of the first ACM SIGKDD workshop on knowledge discovery from uncertain data (U'09). ACM SIGKDD Explorations Newsletter. 11(2):90-91.
2010. Transit portal: BGP connectivity as a service. ACM SIGCOMM Computer Communication Review. 40(4):463-464.
2010. Using friendship ties and family circles for link prediction. Advances in Social Network Mining and Analysis. :97-113.
2010. VAST 2010 Challenge: Arms dealings and pandemics. Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on. :263-264.
2010. Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. SIGCHI '10. :659-668.
2010. Who's Hogging the Bandwidth: The Consequences of Revealing the Invisible in the Home. SIGCHI '10. :659-668.
2010. Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
2010. Young Proteins Experience More Variable Selection Pressures Than Old Proteins. Genome ResearchGenome Res.. 20(11):1574-1581.
2009. 2009 Swine-Origin Influenza A (H1N1) Resembles Previous Influenza Isolates. PLoS ONEPLoS ONE. 4(7):e6402-e6402.
2009. An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
2009. Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
2009. On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
2009. Collusion-free multiparty computation in the mediated model. Advances in Cryptology-CRYPTO 2009. :524-540.
2009. Comparative genomics reveals mechanism for short-term and long-term clonal transitions in pandemic Vibrio cholerae. Proceedings of the National Academy of Sciences. 106(36):15442-15447.
2009. Complete fairness in multi-party computation without an honest majority. Theory of Cryptography. :19-35.
2009. Complete Genome Sequence of Aggregatibacter (Haemophilus) Aphrophilus NJ8700. Journal of BacteriologyJ. Bacteriol.. 191(14):4693-4694.
2009. Computational linguistics for metadata building (CLiMB): using text mining for the automatic identification, categorization, and disambiguation of subject terms for image metadata. Multimedia Tools and Applications. 42(1):115-138.
2009. Conceptual modeling: past, present and the continuum of the future. Conceptual Modeling: Foundations and Applications. :139-152.
2009. A cooperative combinatorial Particle Swarm Optimization algorithm for side-chain packing. IEEE Swarm Intelligence Symposium, 2009. SIS '09. :22-29.
2009. Design guidelines for agent based model visualization. Journal of Artificial Societies and Social Simulation. 12(2):1-1.
2009. Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. Proceedings of the 18th conference on USENIX security symposium. :101-118.