Publications
Export 1389 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is P [Clear All Filters]
2012. Dynamic Searchable Symmetric Encryption. CCS '12 Proceedings of the 2012 ACM Conference on Computer and Communications Security . :965-976.
2007. EcoLens: Integration and interactive visualization of ecological datasets. Ecological Informatics. 2(1):61-69.
2012. Ecology of Vibrio parahaemolyticus and Vibrio vulnificus in the Coastal and Estuarine Waters of Louisiana, Maryland, Mississippi, and Washington (United States). Applied and Environmental Microbiology. (20):7249-7257.
2012. Ecology of Vibrio parahaemolyticus and Vibrio vulnificus in the Coastal and Estuarine Waters of Louisiana, Maryland, Mississippi, and Washington (United States). Applied and Environmental Microbiology. (20):7249-7257.
2006. Edge affinity for pose-contour matching. Computer Vision and Image Understanding. 104(1):36-47.
1997. Editorial: Evaluation and assessment in software engineering. Information and Software Technology. 39(11)
2003. Effect of treatment on the dynamics of circulating hypodermin C in cattle naturally infested with Hypoderma lineatum (Diptera: Oestridae). Veterinary Parasitology. 113(3–4):263-272.
2003. Effect of treatment on the dynamics of circulating hypodermin C in cattle naturally infested with Hypoderma lineatum (Diptera: Oestridae). Veterinary Parasitology. 113(3–4):263-272.
2003. Effect of treatment on the dynamics of circulating hypodermin C in cattle naturally infested with Hypoderma lineatum (Diptera: Oestridae). Veterinary Parasitology. 113(3–4):263-272.
2008. Effective and scalable software compatibility testing. Proceedings of the 2008 international symposium on Software testing and analysis. :63-74.
2008. Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
2008. Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
1992. The effects of time delays on a telepathology user interface.. Proceedings of the Annual Symposium on Computer Application in Medical CareProc Annu Symp Comput Appl Med Care. :256-260.
1991. Efficient algorithms for the minimum weighted dominating clique problem on permutation graphs. Theoretical Computer Science. 91(1):1-21.
2001. Efficient and Non-interactive Non-malleable Commitment. Advances in Cryptology — EUROCRYPT 2001Advances in Cryptology — EUROCRYPT 2001. 2045:40-59.
1996. Efficient distribution analysis via graph contraction. Languages and Compilers for Parallel Computing. :377-391.
2008. Efficient Integrity Checking of Untrusted Network Storage. StorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability . :43-54.
2008. Efficient Integrity Checking of Untrusted Network Storage. StorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability . :43-54.
2002. An efficient k-means clustering algorithm: analysis and implementation. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 24(7):881-892.
1999. Efficient perspective-accurate silhouette computation. Proceedings of the fifteenth annual symposium on Computational geometry. :417-418.
2001. Efficient perspective-accurate silhouette computation and applications. Proceedings of the seventeenth annual symposium on Computational geometry. :60-68.
2010. Efficient Policy-Based Inconsistency Management in Relational Knowledge Bases. Scalable Uncertainty Management: 4th International Conference. 6379:264-264.
2010. Efficient Policy-Based Inconsistency Management in Relational Knowledge Bases. Scalable Uncertainty Management: 4th International Conference. 6379:264-264.