Publications

Export 447 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Marchionini G, Haas S, Plaisant C, Shneiderman B, Hert C.  2005.  Toward a Statistical Knowledge Network (2004). Institute for Systems Research Technical Reports.
Marchionini G, Samet H, Brandt L.  2003.  Digital government. Communications of the ACM. 46(1):25-27.
Marchionini G, Plaisant C, Komlodi A.  1998.  Interfaces and tools for the library of congress national digital library program. Information Processing & Management. 34(5):535-555.
Marchionini G, Hert C, Liddy L, Shneiderman B.  2000.  Extending understanding of federal statistics in tables. Proceedings of the 2000 annual national conference on Digital government research. :1-7.
Marchionini AS, Nation D, Karasik S, Cronnell T, Shneiderman B, Spotfire VDMU, Bederson BB, Data TS, Hochheiser H, Shneiderman B et al..  2003.  Bringing Treasures to the Surface: Previews and Overviews in a Prototype for the Library of Congress National Digital Library. The craft of information visualization: readings and reflections. :388-388.
Marchionini G, Haas S, Plaisant C, Shneiderman B.  2006.  Integrating data and interfaces to enhance understanding of government statistics: toward the national statistical knowledge network project briefing. Proceedings of 7th Annual International Conference on Digital Libraries (DG06). :21-24.
Maon Y, Schieber B, Vishkin U.  1986.  Parallel ear decomposition search (EDS) and st-numbering in graphs. Theoretical Computer Science. 47:277-298.
Mao Y, M. Wu.  2004.  Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
Mao Y, M. Wu.  2006.  A joint signal processing and cryptographic approach to multimedia encryption. Image Processing, IEEE Transactions on. 15(7):2061-2075.
Mao Y, Sun Y, M. Wu, Liu KJR.  2006.  JET: dynamic join-exit-tree amortization and scheduling for contributory key management. IEEE/ACM Trans. Netw.. 14(5):1128-1140.
Mao Y, M. Wu.  2007.  Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2(3):462-467.
Mao Y, Wu M.  2007.  Tracing malicious relays in cooperative wireless communications. Information Forensics and Security, IEEE Transactions on. 2(2):198-212.
Mao Y, Sun Y, M. Wu, Liu KJR.  2004.  Dynamic join-exit amortization and scheduling for time-efficient group key agreement. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2617-2627vol.4-2617-2627vol.4.
Mao Y, M. Wu.  2006.  Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
Mao Y, M. Wu.  2005.  Coordinated sensor deployment for improving secure communications and sensing coverage. Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. :117-128.
Mantri CK, Mohapatra SS, Ramamurthy T, Ghosh R, Colwell RR, Singh DV.  2006.  Septaplex PCR assay for rapid identification of Vibrio cholerae including detection of virulence and int SXT genes. FEMS Microbiology Letters. 265(2):208-214.
Mansy A, Tariq MB, Feamster N, Ammar M.  2009.  Measuring vlan-induced dependencies on a campus network. Proceedings of the ACM SIGCOMM Internet measurement conference.
Mansour Y, Nisan N, Vishkin U.  1994.  Trade-offs between communication throughput and parallel time. Proceedings of the twenty-sixth annual ACM symposium on Theory of computing. :372-381.
Mansour Y, Nisan N, Vishkin U.  1999.  Trade-offs between communication throughput and parallel time. Journal of Complexity. 15(1):148-166.
Manson J, Pugh W, Adve SV.  2005.  The Java memory model. Proceedings of the 32nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :378-391.
Manson J, Pugh W.  2001.  Core semantics of multithreaded Java. Proceedings of the 2001 joint ACM-ISCOPE conference on Java Grande - JGI '01. :29-38.
Manocha D, Varshney A, Weber H.  1993.  Evaluating surface intersections in lower dimensions. Second International Conference on Curves and Surfaces.
Mannes A, Sliva A, V.S. Subrahmanian, Wilkenfeld J.  2008.  Stochastic opponent modeling agents: A case study with Hamas. Proceedings of ICCCD.
Mann AJ, Perlis D.  1977.  Utility Functions, Public Goods, and Income Redistribution. Public Finance Review. 5(1):9-22.
Maniatis P, Akhawe D, Fall K, Elaine Shi, McCamant S, Song D.  2011.  Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection

Pages