Publications

Export 447 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Marchionini G, Hert C, Shneiderman B, Liddy L.  2001.  E-tables: Non-specialist use and understanding of statistical data. SURFACE, the Syracuse University Research Facility And Collaborative Environment. :33-33.
Marchionini G, Plaisant C, Komlodi A.  2003.  The people in digital libraries: Multifaceted approaches to assessing needs and impact. Digital library use: Social practice in design and evaluationDigital library use: Social practice in design and evaluation. :119-160.
Marchionini G, Shneiderman B.  1988.  Finding facts vs. browsing knowledge in hypertext systems. Computer. 21(1):70-80.
Marchionini G, Haas S, Plaisant C, Shneiderman B, Hert C.  2003.  Toward a statistical knowledge network. Proceedings of the 2003 annual national conference on Digital government research. :1-6.
Marchionini G, Shneiderman B.  1993.  Finding facts vs. browsing knowledge in hypertext systems. Sparks of innovation in human-computer interaction. :103-103.
Marchionini G, Haas S, Shneiderman B, Plaisant C, Hert CA.  2004.  Project highlight: toward the statistical knowledge network. Proceedings of the 2004 annual national conference on Digital government research. :125:1–125:2-125:1–125:2.
Maon Y, Schieber B, Vishkin U.  1986.  Parallel ear decomposition search (EDS) and st-numbering in graphs. Theoretical Computer Science. 47:277-298.
Mao Y, Wu M.  2007.  Tracing malicious relays in cooperative wireless communications. Information Forensics and Security, IEEE Transactions on. 2(2):198-212.
Mao Y, Sun Y, M. Wu, Liu KJR.  2004.  Dynamic join-exit amortization and scheduling for time-efficient group key agreement. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2617-2627vol.4-2617-2627vol.4.
Mao Y, M. Wu.  2006.  Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
Mao Y, M. Wu.  2005.  Coordinated sensor deployment for improving secure communications and sensing coverage. Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. :117-128.
Mao Y, M. Wu.  2004.  Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
Mao Y, M. Wu.  2006.  A joint signal processing and cryptographic approach to multimedia encryption. Image Processing, IEEE Transactions on. 15(7):2061-2075.
Mao Y, Sun Y, M. Wu, Liu KJR.  2006.  JET: dynamic join-exit-tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw.. 14(5):1128-1140.
Mao Y, M. Wu.  2007.  Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2(3):462-467.
Mantri CK, Mohapatra SS, Ramamurthy T, Ghosh R, Colwell RR, Singh DV.  2006.  Septaplex PCR assay for rapid identification of Vibrio cholerae including detection of virulence and int SXT genes. FEMS Microbiology Letters. 265(2):208-214.
Mansy A, Tariq MB, Feamster N, Ammar M.  2009.  Measuring vlan-induced dependencies on a campus network. Proceedings of the ACM SIGCOMM Internet measurement conference.
Mansour Y, Nisan N, Vishkin U.  1999.  Trade-offs between communication throughput and parallel time. Journal of Complexity. 15(1):148-166.
Mansour Y, Nisan N, Vishkin U.  1994.  Trade-offs between communication throughput and parallel time. Proceedings of the twenty-sixth annual ACM symposium on Theory of computing. :372-381.
Manson J, Pugh W.  2001.  Core semantics of multithreaded Java. Proceedings of the 2001 joint ACM-ISCOPE conference on Java Grande - JGI '01. :29-38.
Manson J, Pugh W, Adve SV.  2005.  The Java memory model. Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :378-391.
Manocha D, Varshney A, Weber H.  1993.  Evaluating surface intersections in lower dimensions. Second International Conference on Curves and Surfaces.
Mannes A, Sliva A, V.S. Subrahmanian, Wilkenfeld J.  2008.  Stochastic opponent modeling agents: A case study with Hamas. Proceedings of ICCCD.
Mann AJ, Perlis D.  1977.  Utility Functions, Public Goods, and Income Redistribution. Public Finance Review. 5(1):9-22.
Maniatis P, Akhawe D, Fall K, Elaine Shi, McCamant S, Song D.  2011.  Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection

Pages