Publications
Export 1435 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
2006. Saliency-guided Enhancement for Volume Visualization. Visualization and Computer Graphics, IEEE Transactions on. 12(5):925-932.
1998. Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
1999. Running EveryWare on the computational grid. Proceedings of the 1999 ACM/IEEE conference on Supercomputing (CDROM). :6–es-6–es.
2007. Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
2007. Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
2003. Round efficiency of multi-party computation with a dishonest majority. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques. :578-595.
2007. Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.
2007. Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.
1997. The role of compressed document images in transmission and retrieval. Multimedia Signal Processing, 1997., IEEE First Workshop on. :331-336.
2001. The role of a natural language conversational interface in online sales: A case study. International Journal of Speech Technology. 4(3):285-295.
2007. Robust Routing with Unknown Traffic Matrices. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. :2436-2440.
2006. A robust maximum completion time measure for scheduling. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :324-333.
2006. Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
2003. Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
2003. Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
2009. Ring signatures: Stronger definitions, and constructions without random oracles. Journal of Cryptology. 22(1):114-138.
2006. Ring signatures: Stronger definitions, and constructions without random oracles. Theory of Cryptography. :60-79.
2000. REXTOR: a system for generating relations from natural language. Proceedings of the ACL-2000 workshop on Recent advances in natural language processing and information retrieval: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics - Volume 11. :67-77.
2012. Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.