Publications

Export 1435 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Conference Papers
Ye P, Kumar J, Kang L, Doermann D.  2013.  Real-time No-Reference Image Quality Assessment based on Filter Learning. International Conference on Computer Vision and Pattern Recognition (CVPR).
Ye P, Kumar J, Kang L, Doermann D.  2013.  Real-time No-Reference Image Quality Assessment based on Filter Learning. International Conference on Computer Vision and Pattern Recognition (CVPR).
Shivashankar V, Jain R, Kuter U, Nau DS.  2011.  Real-Time Planning for Covering an Initially-Unknown Spatial Environment.
Horvitz O, Katz J, Koo CY, Morselli R.  2004.  Reducing complexity assumptions for statistically-hiding commitment. In EUROCRYPT.
Horvitz O, Katz J, Koo CY, Morselli R.  2004.  Reducing complexity assumptions for statistically-hiding commitment. In EUROCRYPT.
Roussopoulos N, Kelley S.  1983.  A Relational Database to Support Graphical Design and Documentation. Databases for Business and Office Applications, Database Week. :135-149.
Kashyap A, Khuller S, Shayman M.  2006.  Relay Placement for Higher Order Connectivity in Wireless Sensor Networks. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. :1-12.
Kashyap A, Khuller S, Shayman M.  2006.  Relay Placement for Higher Order Connectivity in Wireless Sensor Networks. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. :1-12.
Koo C-Y, Bhandari V, Katz J, Vaidya NH.  2006.  Reliable broadcast in radio networks: the bounded collision case. Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing. :258-264.
Koo C-Y, Bhandari V, Katz J, Vaidya NH.  2006.  Reliable broadcast in radio networks: the bounded collision case. Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing. :258-264.
Roark B, Liu Y, Harper M, Stewart R, Lease M, Snover M, Shafran I, Dorr BJ, Hale J, Krasnyanskaya A et al..  2006.  Reranking for Sentence Boundary Detection in Conversational Speech. 2006 IEEE International Conference on Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 1:I-I-I-I.
Kim J-S, Nam B, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2006.  Resource Discovery Techniques in Distributed Desktop Grid Environments. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing. :9-16.
Kim J-S, Nam B, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2006.  Resource Discovery Techniques in Distributed Desktop Grid Environments. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing. :9-16.
Caragea GC, Tzannes A, Keceli F, Barua R, Vishkin U.  2010.  Resource-Aware Compiler Prefetching for Many-Cores. Parallel and Distributed Computing (ISPDC), 2010 Ninth International Symposium on. :133-140.
Katz B, Jimmy Lin.  2000.  REXTOR: a system for generating relations from natural language. Proceedings of the ACL-2000 workshop on Recent advances in natural language processing and information retrieval: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics - Volume 11. :67-77.
Charikar M, Khuller S.  2006.  A robust maximum completion time measure for scheduling. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :324-333.
Tabatabaee V, Kashyap A, Bhattacharjee B, La RJ, Shayman MA.  2007.  Robust Routing with Unknown Traffic Matrices. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. :2436-2440.
Kia O, Doermann D.  1997.  The role of compressed document images in transmission and retrieval. Multimedia Signal Processing, 1997., IEEE First Workshop on. :331-336.
Garay JA, Katz J, Koo C-Y, Ostrovsky R.  2007.  Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.
Garay JA, Katz J, Koo C-Y, Ostrovsky R.  2007.  Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.
Katz J, Ostrovsky R, Smith A.  2003.  Round efficiency of multi-party computation with a dishonest majority. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques. :578-595.
Wolski R, Brevik J, Krintz C, Obertelli G, Spring N, Su A.  1999.  Running EveryWare on the computational grid. Proceedings of the 1999 ACM/IEEE conference on Supercomputing (CDROM). :6–es-6–es.
Banerjee S, Kommareddy C, Bhattacharjee B.  2002.  Scalable peer finding on the Internet. Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE. 3:2205-2209vol.3-2205-2209vol.3.
Sane N, Kee H, Seetharaman G, Bhattacharyya SS.  2010.  Scalable representation of dataflow graph structures using topological patterns. 2010 IEEE Workshop on Signal Processing Systems (SIPS). :13-18.
Andrade H, Kurc T, Sussman A, Saltz J.  2002.  Scheduling multiple data visualization query workloads on a shared memory machine. Parallel and Distributed Processing Symposium., Proceedings International, IPDPS 2002, Abstracts and CD-ROM. :11-18.

Pages