Publications

Search
Export 490 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Card SK, Mackinlay JD, Shneiderman B.  1999.  Information workspaces. Readings in information visualization. :513-514.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Readings in Information Visualization: Using Vision to Think.
Card SK, Mackinlay JD, Shneiderman B.  1999.  1D, 2D, 3D. Readings in information visualization. :57-61.
Card SK, Mackinlay J, Shneiderman B.  1999.  Departments-Book Preview-Readings in Information Visualization: Using Vision to Think. Interactions. 6(2):51-51.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Internet and Infosphere. Readings in information visualizationReadings in information visualization. :465-468.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 3D. Readings in information visualizationReadings in information visualization. :440-441.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Visually enhanced objects. Readings in information visualization. :561-561.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Fisheye views. Readings in information visualizationReadings in information visualization. :311-311.
Caragea GC, Keceli F, Tzannes A, Vishkin U.  2010.  General-purpose vs. gpu: Comparison of many-cores on irregular workloads. Proceedings of the Second Usenix Workshop on Hot Topics in Parallelism. :14-15.
Caragea GC, Tzannes A, Keceli F, Barua R, Vishkin U.  2010.  Resource-Aware Compiler Prefetching for Many-Cores. Parallel and Distributed Computing (ISPDC), 2010 Ninth International Symposium on. :133-140.
Caragea GC, Vishkin U.  2011.  Brief announcement: better speedups for parallel max-flow. Proceedings of the 23rd ACM symposium on Parallelism in algorithms and architectures. :131-134.
Caragea GC, Saybasili AB, Wen X, Vishkin U.  2009.  Brief announcement: performance potential of an easy-to-program PRAM-on-chip prototype versus state-of-the-art processor. Proceedings of the twenty-first annual symposium on Parallelism in algorithms and architectures. :163-165.
Caprara A, Italiano G, Mohan G, Panconesi A, Srinivasan A.  2000.  Wavelength Rerouting in Optical Networks, or the Venetian Routing Problem. Approximation Algorithms for Combinatorial Optimization. 1913:71-84.
Caprara A, Italiano GF, Mohan G, Panconesi A, Srinivasan A.  2002.  Wavelength rerouting in optical networks, or the Venetian Routing problem. Journal of Algorithms. 45(2):93-125.
Capellades MB, Doermann D, DeMenthon D, Chellappa R.  2003.  An appearance based approach for human and object tracking. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-85-8vol.3-II-85-8vol.3.
Cantet F, Hervio-Heath D, Caro A, Le Mennec C, Monteil C, Quéméré C, Jolivet-Gougeon A, Colwell RR, Monfort P.  2013.  Quantification of Vibrio parahaemolyticus, Vibrio vulnificus and Vibrio cholerae in French Mediterranean coastal lagoons. Research in Microbiology. 164(8):867-874.
Canino D, De Floriani L.  2011.  A Decomposition-based Approach to Modeling and Understanding Arbitrary Shapes. Eurographics Italian Chapter Conference 2011. :53-60.
Canino D, De Floriani L, Weiss K.  2011.  IA*: An adjacency-based representation for non-manifold simplicial shapes in arbitrary dimensions. Computers & Graphics. 35(3):747-753.
Canetti R, Halevi S, Katz J.  2003.  A forward-secure public-key encryption scheme. Advances in Cryptology—Eurocrypt 2003. :646-646.
Canetti R, Halevi S, Katz J, Lindell Y, MacKenzie P.  2005.  Universally composable password-based key exchange. Advances in Cryptology–Eurocrypt 2005. :557-557.
Canetti R, Halevi S, Katz J.  2005.  Adaptively-secure, non-interactive public-key encryption. Theory of Cryptography. :150-168.
Canetti R, Halevi S, Katz J.  2004.  Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. :207-222.
Canetti R, Dachman-Soled D, Vaikuntanathan V, Wee H.  2012.  Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
Canetti R, Halevi S, Katz J.  2004.  Adaptively-Secure, Non-Interactive Public-Key Encryption. Model reduction methods for vector autoregressive processes. :150-150.

Pages