Publications

Export 1435 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Conference Papers
Chowdhury AM, Chellappa R, Keaton T.  2002.  Wide baseline image registration using prior information. Multimedia Signal Processing, 2002 IEEE Workshop on. :37-40.
Konte M, Feamster N.  2011.  Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
Conference Proceedings
Cheng H-C, Cardone A, Krokos E, Stoica B, Faden A, Varshney A.  2017.  Deep-learning-assisted visualization for live-cell images. IEEE International Conference on Image Processing.
Journal Articles
Kingsford C, Nagarajan N, Salzberg SL.  2009.  2009 Swine-Origin Influenza A (H1N1) Resembles Previous Influenza Isolates. PLoS ONEPLoS ONE. 4(7):e6402-e6402.
Kerr DC, Mayergoyz ID.  1998.  3-D Device Simulation Using Intelligent Solution Method Control. VLSI DESIGN. 6(1/4):267-272.
Woods W, Uckun S, Kohane I, Bates J, Hulthage I, Gasser L, Hanks S, Gini M, Ram A, desJardins M et al..  1994.  AAAI 1994 Spring Symposium Series Reports. AI Magazine. 15(3):22-22.
Blake B, Haigh K, Hexmoor H, Falcone R, Soh L-K, Baral C, McIlraith S, Gmytrasiewicz P, Parsons S, Malaka R et al..  2002.  AAAI 2002 Workshops. AI Magazine. 23(4):113-113.
Blake B, Haigh K, Hexmoor H, Falcone R, Soh L-K, Baral C, McIlraith S, Gmytrasiewicz P, Parsons S, Malaka R et al..  2002.  AAAI 2002 Workshops. AI Magazine. 23(4):113-113.
Wobbrock JO, Kane SK, Gajos KZ, Harada S, Froehlich J.  2011.  Ability-based design: Concept, principles and examples. ACM Transactions on Accessible Computing (TACCESS). 3(3)
Andersen DG, Balakrishnan H, Feamster N, Koponen T, Moon D, Shenker S.  2008.  Accountable internet protocol (aip). SIGCOMM Comput. Commun. Rev.. 38(4):339-350.
Khan Z, Amini S, Bloom JS, Ruse C, Caudy AA, Kruglyak L, Singh M, Perlman DH, Tavazoie S.  2011.  Accurate proteome-wide protein quantification from high-resolution 15N mass spectra. Genome Biology. 12(12)
Khan Z, Amini S, Bloom JS, Ruse C, Caudy AA, Kruglyak L, Singh M, Perlman DH, Tavazoie S.  2011.  Accurate proteome-wide protein quantification from high-resolution 15N mass spectra. Genome Biology. 12(12)
Aggarwal G, Panigrahy R, Feder T, Thomas D, Kenthapadi K, Khuller S, Zhu A.  2010.  Achieving anonymity via clustering. ACM Trans. Algorithms. 6(3):49:1–49:19-49:1–49:19.
Aggarwal G, Panigrahy R, Feder T, Thomas D, Kenthapadi K, Khuller S, Zhu A.  2010.  Achieving anonymity via clustering. ACM Trans. Algorithms. 6(3):49:1–49:19-49:1–49:19.
Ishai Y, Katz J, Kushilevitz E, Lindell Y, Petrank E.  2011.  On Achieving the" Best of Both Worlds" in Secure Multiparty Computation. SIAM Journal on Computing. 40(1):122-122.
Ishai Y, Katz J, Kushilevitz E, Lindell Y, Petrank E.  2011.  On Achieving the" Best of Both Worlds" in Secure Multiparty Computation. SIAM Journal on Computing. 40(1):122-122.
Bird S, Dale R, Dorr BJ, Gibson B, Joseph MT, Kan MY, Lee D, Powley B, Radev DR, Tan YF.  2008.  The acl anthology reference corpus: A reference dataset for bibliographic research in computational linguistics. Proc. of the 6th International Conference on Language Resources and Evaluation Conference (LREC’08). :1755-1759.
Karagol-Ayan B, Doermann D, Dorr BJ.  2003.  Acquisition of bilingual MT lexicons from OCRed dictionaries. Proceedings of the 9th MT Summit. :208-215.
Roussopoulos N, Kotidis Y, Sismanis Y.  1999.  The active MultiSync controller of the cubetree storage organization. ACM SIGMOD Record. 28(2):582-583.
Andrade H, Kurc T, Sussman A, Saltz J.  2007.  Active semantic caching to optimize multidimensional data analysis in parallel and distributed environments. Parallel Computing. 33(7-8):497-520.
Kochut A, Agrawala AK, Larsen RL, Shankar UA.  2002.  AD (Attacker Defender) Game. Technical Reports from UMIACS, UMIACS-TR-2001-45.
Krishnamurthy S, Sanders WH, Cukier M.  2003.  An adaptive quality of service aware middleware for replicated services. Parallel and Distributed Systems, IEEE Transactions on. 14(11):1112-1125.
Garay JA, Katz J, Kumaresan R, Zhou HS.  2011.  Adaptively secure broadcast, revisited. Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing.
Garay JA, Katz J, Kumaresan R, Zhou HS.  2011.  Adaptively secure broadcast, revisited. Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing.
Canetti R, Halevi S, Katz J.  2005.  Adaptively-secure, non-interactive public-key encryption. Theory of Cryptography. :150-168.

Pages