Publications
Export 1435 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is K [Clear All Filters]
1999. Transparent communication for distributed objects in Java. Proceedings of the ACM 1999 conference on Java Grande. :160-170.
2006. Trusted declassification:: high-level policy for a security-typed language. Proceedings of the 2006 workshop on Programming languages and analysis for security. :65-74.
2004. Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
2004. Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
2011. A Two Degree of Freedom Nanopositioner With Electrothermal Actuator for Decoupled Motion. :447-457.
2009. UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits. Proceedings of the 27th international conference on Human factors in computing systems. :1043-1052.
2008. Uncovering Genomic Reassortments among Influenza Strains by Enumerating Maximal Bicliques. IEEE International Conference on Bioinformatics and Biomedicine, 2008. BIBM '08. :223-230.
1995. A unifying framework for iteration reordering transformations. Algorithms and Architectures for Parallel Processing, 1995. ICAPP 95. IEEE First ICA/sup 3/PP., IEEE First International Conference on. 1:153-162.
2007. Universally-composable two-party computation in two rounds. Proceedings of the 27th annual international cryptology conference on Advances in cryptology. :111-129.
2013. Unsupervised Classification of Structurally Similar Document Images. International Conference on Document Analysis and Recognition.
2007. Usage-based dhcp lease time optimization. Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. :71-76.
2003. On the use of flow migration for handling short-term overloads. Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE. 6:3108-3112vol.6-3108-3112vol.6.
2001. User modeling for information access based on implicit feedback. 3rd Symposium of ISKO-France, Information Filtering and Automatic Summarisation in networds.
1998. Using elastic windows for World-Wide Web Browsing. CHI 98 conference summary on Human factors in computing systems. :189-190.
1993. Using Synthetic-Perturbation Techniques for Tuning Shared Memory Programs. Parallel Processing, 1993. ICPP 1993. International Conference on. 2:2-10.
2004. Using the structure of Web sites for automatic segmentation of tables. Proceedings of the 2004 ACM SIGMOD international conference on Management of data. :119-130.
2008. Using wearable sensors and real time inference to understand human recall of routine activities. Proceedings of the 10th international conference on Ubiquitous computing. :154-163.
1993. Vacuum-logic. Proceedings of AAAI 1993 Fall Symposium Series: Instantiating Real-World Agents. :51-54.
2010. VAST 2010 Challenge: Arms dealings and pandemics. Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on. :263-264.