Publications

Export 1435 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Kim Y, Varshney A.  2006.  Saliency-guided Enhancement for Volume Visualization. Visualization and Computer Graphics, IEEE Transactions on. 12(5):925-932.
Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
R
Wolski R, Brevik J, Krintz C, Obertelli G, Spring N, Su A.  1999.  Running EveryWare on the computational grid. Proceedings of the 1999 ACM/IEEE conference on Supercomputing (CDROM). :6–es-6–es.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Froehlich J, Krumm J.  2008.  Route prediction from trip observations. SAE SP. 2193
Katz J, Ostrovsky R.  2004.  Round-optimal secure two-party computation. Advances in Cryptology–CRYPTO 2004. :3-34.
Katz J, Vaikuntanathan V.  2011.  Round-optimal password-based authenticated key exchange. Theory of Cryptography. :293-310.
Katz J, Koo CY.  2007.  Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
Katz J, Koo CY.  2007.  Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
Katz J, Ostrovsky R, Smith A.  2003.  Round efficiency of multi-party computation with a dishonest majority. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques. :578-595.
Garay JA, Katz J, Koo C-Y, Ostrovsky R.  2007.  Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.
Garay JA, Katz J, Koo C-Y, Ostrovsky R.  2007.  Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.
Kia O, Doermann D.  1997.  The role of compressed document images in transmission and retrieval. Multimedia Signal Processing, 1997., IEEE First Workshop on. :331-336.
Chai J, Jimmy Lin, Zadrozny W, Ye Y, Stys-Budzikowska M, Horvath V, Kambhatla N, Wolf C.  2001.  The role of a natural language conversational interface in online sales: A case study. International Journal of Speech Technology. 4(3):285-295.
Tabatabaee V, Kashyap A, Bhattacharjee B, La RJ, Shayman MA.  2007.  Robust Routing with Unknown Traffic Matrices. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. :2436-2440.
Charikar M, Khuller S.  2006.  A robust maximum completion time measure for scheduling. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :324-333.
Dodis Y, Katz J, Reyzin L, Smith A.  2006.  Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
Rajagopalan AN, Chellappa R, Koterba N.  2003.  Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
Rajagopalan AN, Chellappa R, Koterba N.  2003.  Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
Bender A, Katz J, Morselli R.  2009.  Ring signatures: Stronger definitions, and constructions without random oracles. Journal of Cryptology. 22(1):114-138.
Bender A, Katz J, Morselli R.  2006.  Ring signatures: Stronger definitions, and constructions without random oracles. Theory of Cryptography. :60-79.
Katz B, Jimmy Lin.  2000.  REXTOR: a system for generating relations from natural language. Proceedings of the ACL-2000 workshop on Recent advances in natural language processing and information retrieval: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics - Volume 11. :67-77.
Konte M, Feamster N.  2012.  Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.

Pages