Publications

Export 377 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is Y  [Clear All Filters]
2011
Katz J, Schröder D, Yerukhimovich A.  2011.  Impossibility of blind signatures from one-way permutations. Theory of Cryptography. :615-629.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  A large-scale benchmark dataset for event recognition in surveillance video. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :3153-3160.
Groce A, Katz J, Yerukhimovich A.  2011.  Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
Brakerski Z, Katz J, Segev G, Yerukhimovich A.  2011.  Limits on the power of zero-knowledge proofs in cryptographic constructions. Theory of Cryptography. :559-578.
Ye P, Doermann D.  2011.  No-reference image quality assessment based on visual codebook. Image Processing (ICIP), 2011 18th IEEE International Conference on. :3089-3092.
Darrell TJ, Tom Yeh, Tollmar K.  2011.  Photo-based mobile deixis system and related techniques. 10/762,941(7872669)
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Sharma P, Khurana U, Shneiderman B, Scharrenbroich M, Locke J.  2011.  Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
Yu M, Rexford J, Sun X, Rao S, Feamster N.  2011.  A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.
Ahn J-wook, Taieb-Maimon M, Sopan A, Plaisant C, Shneiderman B.  2011.  Temporal Visualization of Social Network Dynamics: Prototypes for Nation of Neighbors. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:309-316.
Yoon I, Sussman A, Memon AM, Porter A.  2011.  Towards incremental component compatibility testing. Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, CBSE. 11:119-128.
Lieberman MD, Taheri S, Guo H, Mirrashed F, Yahav I, Aris A, Shneiderman B.  2011.  Visual Exploration across Biomedical Databases. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 8(2):536-550.
Yu X, Fermüller C, Aloimonos Y.  2011.  Visual Scene Interpretation as a Dialogue between Vision and Language. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
2010
Gordon S, Katz J, Kumaresan R, Yerukhimovich A.  2010.  Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
Yung M, Katz J.  2010.  Digital Signatures. :192.
Yuan X, Memon AM.  2010.  Generating Event Sequence-Based Test Cases Using GUI Runtime State Feedback. Software Engineering, IEEE Transactions on. 36(1):81-95.
Chang T-H, Tom Yeh, Miller RC.  2010.  GUI testing using computer vision. Proceedings of the 28th international conference on Human factors in computing systems. :1535-1544.
Grasso MA, Mokashi R, Dalvi D, Cardone A, Dima AA, Bhadriraju K, Plant AL, Brady M, Yesha Y, Yesha Y.  2010.  Image classification of vascular smooth muscle cells. Proceedings of the 1st ACM International Health Informatics Symposium. :484-486.
Grasso MA, Mokashi R, Dalvi D, Cardone A, Dima AA, Bhadriraju K, Plant AL, Brady M, Yesha Y, Yesha Y.  2010.  Image classification of vascular smooth muscle cells. Proceedings of the 1st ACM International Health Informatics Symposium. :484-486.
Yuan X, Memon AM.  2010.  Iterative execution-feedback model-directed GUI testing. Information and Software Technology. 52(5):559-575.
Doppa J, Yu J, Tadepalli P, Getoor L.  2010.  Learning algorithms for link prediction based on chance constraints. Machine Learning and Knowledge Discovery in Databases. :344-360.
Caceres A, Shang F, Wawrousek E, Liu Q, Avidan O, Cvekl A, Yang Y, Haririnia A, Storaska A, Fushman D et al..  2010.  Perturbing the Ubiquitin Pathway Reveals How Mitosis Is Hijacked to Denucleate and Regulate Cell Proliferation and Differentiation In Vivo. PLoS ONEPLoS ONE. 5(10):e13331-e13331.
Li Y, Yu X, Ho J, Fushman D, Allewell NM, Tuchman M, Shi D.  2010.  Reversible Post-Translational Carboxylation Modulates the Enzymatic Activity of N-Acetyl-l-ornithine Transcarbamylase. Biochemistry. 49(32):6887-6895.
Bigham JP, Jayant C, Ji H, Little G, Miller A, Miller RC, Miller R, Tatarowicz A, White B, White S et al..  2010.  VizWiz: nearly real-time answers to visual questions. Proceedings of the 23nd annual ACM symposium on User interface software and technology. :333-342.
Bigham JP, Jayant C, Miller A, White B, Tom Yeh.  2010.  VizWiz::LocateIt - enabling blind people to locate objects in their environment. Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on. :65-72.

Pages