Publications
Export 377 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is Y [Clear All Filters]
2011. Impossibility of blind signatures from one-way permutations. Theory of Cryptography. :615-629.
2011. A large-scale benchmark dataset for event recognition in surveillance video. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :3153-3160.
2011. Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
2011. Limits on the power of zero-knowledge proofs in cryptographic constructions. Theory of Cryptography. :559-578.
2011. No-reference image quality assessment based on visual codebook. Image Processing (ICIP), 2011 18th IEEE International Conference on. :3089-3092.
2011. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
2011. Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
2011. A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.
2011. Temporal Visualization of Social Network Dynamics: Prototypes for Nation of Neighbors. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:309-316.
2011. Towards incremental component compatibility testing. Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, CBSE. 11:119-128.
2011. Visual Exploration across Biomedical Databases. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 8(2):536-550.
2011. Visual Scene Interpretation as a Dialogue between Vision and Language. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
2010. Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
2010. Generating Event Sequence-Based Test Cases Using GUI Runtime State Feedback. Software Engineering, IEEE Transactions on. 36(1):81-95.
2010. GUI testing using computer vision. Proceedings of the 28th international conference on Human factors in computing systems. :1535-1544.
2010. Image classification of vascular smooth muscle cells. Proceedings of the 1st ACM International Health Informatics Symposium. :484-486.
2010. Image classification of vascular smooth muscle cells. Proceedings of the 1st ACM International Health Informatics Symposium. :484-486.
2010. Iterative execution-feedback model-directed GUI testing. Information and Software Technology. 52(5):559-575.
2010. Learning algorithms for link prediction based on chance constraints. Machine Learning and Knowledge Discovery in Databases. :344-360.
2010. Perturbing the Ubiquitin Pathway Reveals How Mitosis Is Hijacked to Denucleate and Regulate Cell Proliferation and Differentiation In Vivo. PLoS ONEPLoS ONE. 5(10):e13331-e13331.
2010. Reversible Post-Translational Carboxylation Modulates the Enzymatic Activity of N-Acetyl-l-ornithine Transcarbamylase. Biochemistry. 49(32):6887-6895.
2010. VizWiz: nearly real-time answers to visual questions. Proceedings of the 23nd annual ACM symposium on User interface software and technology. :333-342.
2010. VizWiz::LocateIt - enabling blind people to locate objects in their environment. Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on. :65-72.