Publications

Search
Export 7058 results:
Author Title Type [ Year(Asc)]
2013
Papamanthou C, Shi E, Tamassia R.  2013.  Signatures of Correct Computation. Theory of Cryptography. :222-242.
Cardone A, Pant H, Hassan SA.  2013.  Specific and Non-Specific Protein Association in Solution: Computation of Solvent Effects and Prediction of First-Encounter Modes for Efficient Configurational Bias Monte Carlo Simulations. The Journal of Physical Chemistry B. 117(41):12360-12374.
Boyd-Graber J, Glasgow K, Zajac JS.  2013.  Spoiler Alert: Machine Learning Approaches to Detect Social Media Posts with Revelatory Information.
Papamanthou C, Shi E, Tamassia R, Yi K.  2013.  Streaming Authenticated Data Structures. Advances in Cryptology – EUROCRYPT 2013. :353-370.
Kumar J, Ye P, Doermann D.  2013.  Structural similarity for document image classification and retrieval. Pattern Recognition Letters.
Dumitras T, Narasimhan P.  2013.  A study of unpredictability in fault-tolerant middleware. Computer Networks. 57(3):682-698.
Haft DH, Selengut JD, Richter RA, Harkins D, Basu MK, Beck E.  2013.  TIGRFAMs and Genome Properties in 2013.. Nucleic Acids Res. 41(Database issue):D387-95.
Li-Baboud Y-S, Cardone A, Chalfoun J, Bajcsy P, Elliott J.  2013.  Understanding the impact of image quality on segmentation accuracy. SPIE Newsroom.
Kumar J, Doermann D.  2013.  Unsupervised Classification of Structurally Similar Document Images. International Conference on Document Analysis and Recognition.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.
2012
Memon AM.  2012.  Advances in Computers.
Lin HC, Goldstein S, Mendelowitz L, Zhou S, Wetzel J, Schwartz DC, Pop M.  2012.  AGORA: Assembly Guided by Optical Restriction Alignment. BMC bioinformatics. 13(1)
Haft DH, Payne SH, Selengut JD.  2012.  Archaeosortases and exosortases are widely distributed systems linking membrane transit with posttranslational modification.. J Bacteriol. 194(1):36-48.
Dumitras T, Efstathopoulos P.  2012.  Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
Svec P, Gupta SK.  2012.  Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
Roy A, Halder B, Garain U, Doermann D.  2012.  Automatic Authentication of Banknotes. IEEE Transactions on Information Forensics & Security.
Lee SHee, Kalejta RF, Kerry J, Semmes OJohn, O’Connor CM, Khan Z, Garcia BA, Shenk T, Murphy E.  2012.  BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
Ayres DL, Darling A, Zwickl DJ, Beerli P, Holder MT, Lewis PO, Huelsenbeck JP, Ronquist F, Swofford DL, Cummings MP et al..  2012.  BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
Bilge L, Dumitras T.  2012.  Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
Satinoff B, Boyd-Graber J.  2012.  Besting the Quiz Master: Crowdsourcing Incremental Classification Games. Empirical Methods in Natural Language Processing.
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Cardone A, Amelot J, Li-Baboud Y-S, Brady M, Bajcsy P.  2012.  Biases from model assumptions in texture sub-cellular image segmentation. SPIE Newsroom. 13
Gevers D, Pop M, Schloss PD, Huttenhower C.  2012.  Bioinformatics for the Human Microbiome Project. PLoS Computational Biology. 8(11):e1002779.
Gopalan R, Taheri S, Turaga P, Chellappa R.  2012.  A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
Choi SGeol, Dachman-Soled D, Yung M.  2012.  On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.

Pages