Publications

Export 366 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is E  [Clear All Filters]
2011
Huang Y, Shen C, Evans D, Katz J, Shelat A.  2011.  Efficient Secure Computation with Garbled Circuits. Information Systems Security. :28-48.
Shuttleworth RR, Elman H, Long KR, Templeton JA.  2011.  Fast solvers for models of ICEO microfluidic flows. International Journal for Numerical Methods in Fluids. 65(4):383-404.
Huang Y, Evans D, Katz J, Malka L.  2011.  Faster secure two-party computation using garbled circuits. USENIX Security Symposium.
Sundaresan S, Feamster N, Teixeira R, Tang A, W. Edwards K, Grinter RE, Chetty M, de Donato W.  2011.  Helping Users Shop for ISPs with Internet Nutrition Labels. ACM SIGCOMM Workshop on Home Networks '11. :13-18.
LeMoigne J, Netanyahu NS, Eastman RD.  2011.  Image Registration for Remote Sensing. :515.
Calvert KL, Edwards KW, Feamster N, Grinter RE, Deng Y, Zhou X.  2011.  Instrumenting home networks. SIGCOMM Comput. Commun. Rev.. 41(1):84-89.
Zhou X, Garcia-Romero D, Duraiswami R, Espy-Wilson C, Shamma S.  2011.  Linear versus Mel Frequency Cepstral Coefficients for Speaker Recognition. IEEE Automatic Speech Recognition and Understanding Workshop.
Hasan NA, Chowdhury BW, Rahim N, Sultana M, Shabnam AS, Mai V, Ali A, Morris GJ, Sack BR, Huq A et al..  2011.  Metagenomic 16S rDNA Targeted PCR-DGGE in Determining Bacterial Diversity in Aquatic Ecosystem. Bangladesh Journal of Microbiology. 27(2)
Bhattacharyya SS, Eker J, Janneck JW, Lucarz C, Mattavelli M, Raulet M.  2011.  Overview of the MPEG Reconfigurable Video Coding Framework. Journal of Signal Processing Systems. 63(2):251-263.
Wu S, Elsayed T, Rand W, Raschid L.  2011.  Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
Huang Y, Evans D, Katz J.  2011.  Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? 19th Network and Distributed Security Symposium.
Eaton E, desJardins M, others.  2011.  Selective transfer between learning tasks using task-based boosting. Twenty-Fifth AAAI Conference on Artificial Intelligence.
Abd-Almageed W, Blace RE, Eltoweissy M.  2011.  Threat-Aware Clustering in Wireless Sensor Networks. IFIP Advances in Information and Communication Technology (AICT). 264(264):1-12.
Everett LJ, Jensen ST, Hannenhalli S.  2011.  Transcriptional Regulation Via TF-Modifying Enzymes: An Integrative Model-Based Analysis. Nucleic Acids ResearchNucl. Acids Res.. 39(12):e78-e78-e78-e78.
Drizd T, Eaton C, Plaisant C.  2011.  Visualizing Missing Data: Graph Interpretation User Study. IFIP Lecture Notes in Computer Science (LNCS). 3585(3585):861-872.
Chung JM, Easley GR, O'Leary DP.  2011.  Windowed Spectral Regularization of Inverse Problems. SIAM Journal on Scientific Computing. 33(6)
2012
W Easterday R, Kausrud KL, Star B, Heier L, Haley BJ, Ageyev V, Colwell RR, Stenseth NChr.  2012.  An additional step in the transmission of Yersinia pestis? The ISME Journal. (2):231-236.
Dumitras T, Efstathopoulos P.  2012.  Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
Hasan N.A, Choi S.Y, Eppinger M., Clark P.W, Chen A., Alam M., Haley B.J, Taviani E., Hine E., Su Q. et al..  2012.  Genomic diversity of 2010 Haitian cholera outbreak strains. Proceedings of the National Academy of Sciences. :E2010-E2017.
Earl C, Sergey I, Might M, Van Horn D.  2012.  Introspective Pushdown Analysis of Higher-Order Programs. arXiv:1207.1813 [cs].
Haley BJ, Chen A, Grim CJ, Clark P, Diaz CM, Taviani E, Hasan NA, Sancomb E, Elnemr WM, Islam MA et al..  2012.  Vibrio cholerae in a historically cholera-free country. Environmental Microbiology Reports. (4):381-389.
Barrett C, Beckman R, Bisset K, Chen J, DuBois T, Eubank S, Kumar AVS, Lewis B, Marathe MV, Srinivasan A et al..  2012.  Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
Dumitras T, Efstathopoulos P..  2012.  The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
Huang Y, Katz J, Evans D.  2012.  Quid Pro Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. IEEE Symposium on Security and Privacy.
Nahar S, Sultana M, Naser NM, Nair GB, Watanabe H, Ohnishi M, Yamamoto S, Endtz H, Cravioto A, Sack BR et al..  2012.  Role of Shrimp Chitin in the Ecology of Toxigenic Vibrio cholerae and Cholera Transmission. Frontiers in Microbiology. 2:260

Pages