Publications

Export 1435 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2007
Boneh D, Canetti R, Halevi S, Katz J.  2007.  Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.
He S, Kirovski D, M. Wu.  2007.  Colluding Fingerprinted Video using the Gradient Attack. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II-161-II-164-II-161-II-164.
Shen CC, Kupershtok R, Yang B, Vanin FM, Shao X, Sheth D, Goldsman N, Balzano Q, Bhattacharyya SS.  2007.  Compact, low power wireless sensor network system for line crossing recognition. Circuits and Systems, 2007. ISCAS 2007. IEEE International Symposium on. :2506-2509.
Kim J, JaJa JF.  2007.  Component-based Data Layout for Efficient Slicing of Very Large Multidimensional Volumetric Data. Scientific and Statistical Database Management, 2007. SSBDM '07. 19th International Conference on. :8-8.
Leparc GG, Mitra RD, Vardhanabhuti S, Wang J, Hannenhalli S, Smit S, Widmann J, Knight R, Wu S, Zhang Y et al..  2007.  COMPUTATIONAL BIOLOGY. Nucleic acids research. 35(9-12):3163-3163.
Khuller S, Martinez M, Nau DS, Sliva A, Simari G, Subrahmanian V.  2007.  Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10^30,000 worlds. Annals of Mathematics and Artificial Intelligence. 51(2):295-331.
Sidhu T, Klavans J, Jimmy Lin.  2007.  Concept disambiguation for improved subject access using multiple knowledge sources. Proceedings of the Workshop on Language Technology for Cultural Heritage Data (LaTeCH 2007). :25-25.
Hazay C, Katz J, Koo CY, Lindell Y.  2007.  Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
Hazay C, Katz J, Koo CY, Lindell Y.  2007.  Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography. :323-341.
Kuter U, Nau DS, Reisner E, Goldman R.  2007.  Conditionalization: Adapting forward-chaining planners to partially observable environments.
Kim J-S, Nam B, Marsh M, Keleher P, Bhattacharjee B, Richardson D, Wellnitz D, Sussman A.  2007.  Creating a Robust Desktop Grid using Peer-to-Peer Services. Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International. :1-7.
Kim J-S, Nam B, Marsh M, Keleher P, Bhattacharjee B, Richardson D, Wellnitz D, Sussman A.  2007.  Creating a Robust Desktop Grid using Peer-to-Peer Services. Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International. :1-7.
Chafekar D, Kumar AVS, Marathe MV, Parthasarathy S, Srinivasan A.  2007.  Cross-layer latency minimization in wireless networks with SINR constraints. Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. :110-119.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2007.  Distributed Ranked Search. High Performance Computing – HiPC 2007High Performance Computing – HiPC 2007. 4873:7-20.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2007.  Distributed ranked search. High Performance Computing–HiPC 2007. :7-20.
Ghedin E, Wang S, Spiro D, Caler E, Zhao Q, Crabtree J, Allen JE, Delcher AL, Guiliano DB, Miranda-Saavedra D et al..  2007.  Draft Genome of the Filarial Nematode Parasite Brugia Malayi. Science. 317(5845):1756-1760.
Ghedin E, Wang S, Spiro D, Caler E, Zhao Q, Crabtree J, Allen JE, Delcher AL, Guiliano DB, Miranda-Saavedra D et al..  2007.  Draft Genome of the Filarial Nematode Parasite Brugia Malayi. Science. 317(5845):1756-1760.
Ghedin E, Wang S, Spiro D, Caler E, Zhao Q, Crabtree J, Allen JE, Delcher AL, Guiliano DB, Miranda-Saavedra D et al..  2007.  Draft Genome of the Filarial Nematode Parasite Brugia Malayi. Science. 317(5845):1756-1760.
Ghedin E, Wang S, Spiro D, Caler E, Zhao Q, Crabtree J, Allen JE, Delcher AL, Guiliano DB, Miranda-Saavedra D et al..  2007.  Draft Genome of the Filarial Nematode Parasite Brugia Malayi. Science. 317(5845):1756-1760.
Katz J.  2007.  Efficient cryptographic protocols based on the hardness of learning parity with noise. Proceedings of the 11th IMA international conference on Cryptography and coding. :1-15.
Goh EJ, Jarecki S, Katz J, Wang N.  2007.  Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Journal of Cryptology. 20(4):493-514.
Hsu CJ, Ko MY, Bhattacharyya SS, Ramasubbu S, Pino JL.  2007.  Efficient simulation of critical synchronous dataflow graphs. ACM Transactions on Design Automation of Electronic Systems (TODAES). 12(3):1-28.
Komlodi A, Hou W, Preece J, Druin A, Golub E, Alburo J, Liao S, Elkiss A, Resnik P.  2007.  Evaluating a cross-cultural children’s online book community: Lessons learned for sociability, usability, and cultural exchange. Interacting with Computers. 19(4):494-511.
Clark AG, Eisen MB, Smith DR, Bergman CM, Oliver B, Markow TA, Kaufman TC, Kellis M, Gelbart W, Iyer VN et al..  2007.  Evolution of genes and genomes on the Drosophila phylogeny. Nature. 450(7167):203-218.
Clark AG, Eisen MB, Smith DR, Bergman CM, Oliver B, Markow TA, Kaufman TC, Kellis M, Gelbart W, Iyer VN et al..  2007.  Evolution of genes and genomes on the Drosophila phylogeny. Nature. 450(7167):203-218.

Pages