Publications
Export 620 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is T [Clear All Filters]
2008. Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science. :80-96.
2008. Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
2008. Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
1980. Automatic database system conversion: A transformation language approach to sub-schema implementation. IEEE Computer Software and Applications Conference. :80-88.
1982. Automatic database system conversion: schema revision, data translation, and source-to-source program transformation. Proceedings of the June 7-10, 1982, national computer conference. :579-587.
2007. Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
2011. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
2004. Bidimensional Parameters and Local Treewidth. Latin 2004: Theoretical Informatics: 6th Latin American Symposium, Buenos Aires, Argentina, April 5-8, 2004: Proceedings. :109-109.
2006. Block preconditioners based on approximate commutators. SIAM Journal on Scientific Computing. 27(5):1651-1668.
2011. Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
2012. A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
2012. A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
2005. Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing. 35(1):217-217.
2011. Broadband internet performance: A view from the gateway. SIGCOMM-Computer Communication Review. 41(4):134-134.
2003. Broadening Access to Large Online Databases by Generalizing Query Previews. The Craft of Information VisualizationThe Craft of Information Visualization. :31-37.
2005. Broadening Access to Large Online Databases by Generalizing Query Previews (2000). Institute for Systems Research Technical Reports.
2010. Broader incorporation of bioinformatics in education: opportunities and challenges. Brief Bioinform. 11(537-543)
2007. Browsing large online data tables using generalized query previews. Information Systems. 32(3):402-423.
2005. Browsing Large Online Data Tables Using Generalized Query Previews (2001). Institute for Systems Research Technical Reports.
2001. Building an Experience Base for Software Engineering: A report on the first CeBASE eWorkshop. Product Focused Software Process Improvement. :110-125.