Publications

Export 383 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Huang M, DeMenthon D, Doermann D, Golebiowski L.  2005.  Document Ranking by Layout Relevance. ICDAR. :362-366.
Huang Y, Feamster N, Lakhina A, Xu J(J).  2007.  Diagnosing network disruptions with network-wide analysis. SIGMETRICS Perform. Eval. Rev.. 35(1):61-72.
Huang S, Cohen MB, Memon AM.  2010.  Repairing GUI Test Suites Using a Genetic Algorithm. Software Testing, Verification and Validation (ICST), 2010 Third International Conference on. :245-254.
Huang Y, Katz J, Evans D.  2012.  Quid Pro Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. IEEE Symposium on Security and Privacy.
Huang L, Aloimonos Y.  1994.  How normal flow constrains relative depth for an active observer. Image and vision computing. 12(7):435-445.
Huang C-M, O'Leary DP.  1992.  Preconditioning parallel multisplittings for solving linear systems of equations. Proceedings of the 6th international conference on Supercomputing. :478-484.
Huang Y, Malka L, Evans D, Katz J.  2011.  Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.
Huang L, Aloimonos Y.  1991.  Relative depth from motion using normal flow: an active and purposive solution. Proceedings of the IEEE Workshop on Visual Motion, 1991. :196-204.
Huang Y, Evans D, Katz J, Malka L.  2011.  Faster secure two-party computation using garbled circuits. USENIX Security Symposium.
Huang M, Mayergoyz ID, Goldsman N.  2000.  Numerical simulation of small-signal microwave performance of 4H–SiC MESFET. Solid-State Electronics. 44(7):1281-1287.
Huang Y, Shen C, Evans D, Katz J, Shelat A.  2011.  Efficient Secure Computation with Garbled Circuits. Information Systems Security. :28-48.
Huang Y, Evans D, Katz J.  2011.  Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? 19th Network and Distributed Security Symposium.
Huang Y, Feamster N, Teixeira R.  2008.  Practical issues with using network tomography for fault diagnosis. SIGCOMM Comput. Commun. Rev.. 38(5):53-58.
Huang C-M, O'Leary DP.  1993.  A Krylov multisplitting algorithm for solving linear systems of equations. Linear Algebra and its Applications. 194:9-29.
Huang YM, JaJa JF.  1995.  An Optimal Ear Decomposition Algorithm with Applications on Fixed-Size Linear Arrays. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING.
Hui A, Vaczlavik L, De Floriani L.  2006.  A decomposition-based representation for 3D simplicial complexes. Proceedings of the fourth Eurographics symposium on Geometry processing. :101-110.
Hui A, De Floriani L.  2007.  Topological Decompositions for 3D Non-manifold Simplicial Shapes. CS-TR-4855
Hui A, De Floriani L.  2007.  A two-level topological decomposition for non-manifold simplicial shapes. Proceedings of the 2007 ACM symposium on Solid and physical modeling. :355-360.
Hui A, De Floriani L.  2006.  A dimension-independent simplicial data structure for non-manifold shapes. CS-TR-4794
[Anonymous].  1995.  Dissertations. ACM SIGCHI Bulletin. 27(1):73-75.
Humphrey SM, Shneiderman B.  1992.  DISSERTATIONS: ABSTRACTS OF INTEREST. ACM SIGCHI Bulletin. 24(2):58-75.
Hung E, Getoor L, V.S. Subrahmanian.  2003.  PXML: a probabilistic semistructured data model and algebra. Data Engineering, 2003. Proceedings. 19th International Conference on. :467-478.
Hung E, Deng Y, V.S. Subrahmanian.  2004.  TOSS: an extension of TAX with ontologies and similarity queries. Proceedings of the 2004 ACM SIGMOD international conference on Management of data. :719-730.
Hung E, Deng Y, V.S. Subrahmanian.  2005.  RDF aggregate queries and views. Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on. :717-728.
Hung E, Getoor L, V.S. Subrahmanian.  2007.  Probabilistic interval XML. ACM Transactions on Computational Logic (TOCL). 8(4)

Pages