Publications
Export 1435 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
2007. Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News. 38(3):20-22.
2006. Review of "Primality Testing in Polynomial Time by Martin Dietzfelbinger", Springer-Verlag, 2004. SIGACT News. 37(1):14-15.
2008. A review of overview+ detail, zooming, and focus+ context interfaces. ACM Computing Surveys (CSUR). 41(1):1-31.
2012. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
2006. Review of "A Computational Introduction to Number Theory and Algebra by Victor Shoup", Cambridge University Press, 2005. SIGACT News. 37(1):12-13.
2009. Revealing biological modules via graph summarization. Journal of Computational Biology. 16(2):253-264.
1993. Restructuring knowledge for an electronic encyclopedia. Sparks of innovation in human-computer interaction. 615:123-123.
2000. Resource-aware meta-computing. Emphasizing Distributed SystemsEmphasizing Distributed Systems. Volume 53:109-169.
2010. Resource-Aware Compiler Prefetching for Many-Cores. Parallel and Distributed Computing (ISPDC), 2010 Ninth International Symposium on. :133-140.
2006. Resource Discovery Techniques in Distributed Desktop Grid Environments. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing. :9-16.
2006. Resource Discovery Techniques in Distributed Desktop Grid Environments. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing. :9-16.
2008. Resource allocation for tracking multiple targets using particle filters. The Eighth International Workshop on Visual Surveillance.
2000. Residual coding in document image compression. Image Processing, IEEE Transactions on. 9(6):961-969.
2011. Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
2011. Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
2006. Reranking for Sentence Boundary Detection in Conversational Speech. 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 1:I-I-I-I.
2010. REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):87-87.
2010. REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):87-87.
1993. Remote direct manipulation: A case study of a telemedicine workstation. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :51-51.
2007. Reliable Effects Screening: A Distributed Continuous Quality Assurance Process for Monitoring Performance Degradation in Evolving Software Systems. Software Engineering, IEEE Transactions on. 33(2):124-141.
2006. Reliable broadcast in radio networks: the bounded collision case. Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing. :258-264.
2006. Reliable broadcast in radio networks: the bounded collision case. Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing. :258-264.
2006. Relay Placement for Higher Order Connectivity in Wireless Sensor Networks. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. :1-12.
2006. Relay Placement for Higher Order Connectivity in Wireless Sensor Networks. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. :1-12.