Publications
Export 479 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is D [Clear All Filters]
2005. Multi-resolution out-of-core modeling of terrain and geological data. Proceedings of the 13th annual ACM international workshop on Geographic information systems. :143-152.
2005. Clustering Techniques for Out-of-Core Multi-resolution Modeling. Visualization Conference, IEEE. :113-113.
2002. Half-edge Multi-Tessellation: a compact representations for multiresolution tetrahedral meshes. Proceedings 1st International Symposium on 3D Data Processing Visualization and Transmission. :494-499.
2007. Out-of-core Multi-resolution Terrain Modeling. Spatial data on the Web: modeling and management. :43-43.
2007. Multi-resolution Morse-Smale Complexes for Terrain Modeling. Image Analysis and Processing, 2007. ICIAP 2007. 14th International Conference on. :337-342.
2005. Software process improvement in small organizations: a case study. Software, IEEE. 22(6):68-75.
2005. Dynamic Queries and Brushing on Choropleth Maps (2001). Institute for Systems Research Technical Reports.
2001. Dynamic queries and brushing on choropleth maps. Fifth International Conference on Information Visualisation, 2001. Proceedings. :757-764.
1997. Hardness of flip-cut problems from optical mapping. Journal of Computational Biology. 4(2):119-125.
1997. Hardness of flip-cut problems from optical mapping [DNA molecules application]. Compression and Complexity of Sequences 1997. Proceedings. :275-284.
2007. Distribution-Free Testing Lower Bounds for Basic Boolean Functions. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :494-508.
2014. On Minimal Assumptions for Sender-Deniable Public Key Encryption. Public-Key Cryptography – PKC 2014. :574-591.
2014. Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? Theory of Cryptography. :217-239.
2012. Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
2007. Geometrical Characteristics of Regular Polyhedra: Application to EXAFS Studies of Nanoclusters. X-RAY ABSORPTION FINE STRUCTURE - XAFS13: 13th International Conference. 882:746-748.
2013. Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments. Advances in Cryptology - ASIACRYPT 2013. :316-336.
2011. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
2009. Efficient Robust Private Set Intersection. Applied Cryptography and Network Security. :125-142.
2011. A Canonical Form for Testing Boolean Function Properties. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :460-471.
2008. Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
2007. Configuration Reasoning and Ontology For Web. IEEE International Conference on Services Computing, 2007. SCC 2007. :387-394.