Publications

Export 1435 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Journal Articles
Kim K, Harwood D, Davis LS.  2005.  Background updating for visual surveillance. Advances in Visual Computing. :337-346.
Khuller S, Raghavachari B, Young N.  1995.  Balancing minimum spanning trees and shortest-path trees. Algorithmica. 14(4):305-321.
Prasad V, Kellokumpu V, Davis LS.  2006.  Ballistic hand movements. Articulated Motion and Deformable Objects. :153-164.
Koren S, Treangen TJ, Pop M.  2011.  Bambus 2: scaffolding metagenomes. Bioinformatics. 27(21):2964-2971.
Deligiannakis A, Kotidis Y, Roussopoulos N.  2008.  Bandwidth-constrained queries in sensor networks. The VLDB Journal. 17(3):443-467.
Lee SHee, Kalejta RF, Kerry J, Semmes OJohn, O’Connor CM, Khan Z, Garcia BA, Shenk T, Murphy E.  2012.  BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
Lee SHee, Kalejta RF, Kerry J, Semmes OJohn, O’Connor CM, Khan Z, Garcia BA, Shenk T, Murphy E.  2012.  BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
Lee SHee, Kalejta RF, Kerry J, Semmes OJohn, O’Connor CM, Khan Z, Garcia BA, Shenk T, Murphy E.  2012.  BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
Ko MY, Murthy PK, Bhattacharyya SS.  2007.  Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls. ACM Transactions on Embedded Computing Systems (TECS). 6(2):14–es-14–es.
Kolda TG, O'Leary DP, Nazareth L.  1998.  BFGS with Update Skipping and Varying Memory. SIAM Journal on Optimization. 8(4):1060-1083.
Kanungo T, Resnik P, Mao S, Kim DW, Zheng Q.  2005.  The Bible and multilingual optical character recognition. Communications of the ACM. 48(6):124-130.
Kanungo T, Resnik P, Mao S, Kim DW, Zheng Q.  2005.  The Bible and multilingual optical character recognition. Communications of the ACM. 48(6):124-130.
Khuller S, Vishkin U.  1994.  Biconnectivity approximations and graph carvings. Journal of the ACM (JACM). 41(2):214-235.
Kustanowitz J, Shneiderman B.  2005.  Bi-Level Hierarchical Layouts for Photo Libraries: Algorithms for Design Optimization with Quantum Content. Institute for Systems Research Technical Reports.
Katz J.  2004.  Binary tree encryption: Constructions and applications. Information Security and Cryptology-ICISC 2003. :1-11.
Golubchik L, Cheng WC, Chou C-F, Khuller S, Samet H, Wan JC.  2003.  Bistro: a scalable and secure data transfer service for digital government applications. Commun. ACM. 46(1):50-51.
Golubchik L, Cheng WC, Chou C-F, Khuller S, Samet H, Wan JC.  2003.  Bistro: a scalable and secure data transfer service for digital government applications. Communications of the ACM. 46(1):50-51.
Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
Hwa R, Resnik P, Weinberg A, Cabezas C, Kolak O.  2005.  Bootstrapping parsers via syntactic projection across parallel texts. Nat. Lang. Eng.. 11(3):311-325.
Horvitz O, Katz J.  2010.  Bounds on the efficiency of black-box commitment schemes. Theoretical Computer Science. 411(10):1251-1260.
Horvitz O, Katz J.  2005.  Bounds on the efficiency of black-box commitment schemes. Automata, Languages and Programming. :62-62.
Gennaro R, Gertner Y, Katz J, Trevisan L.  2005.  Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing. 35(1):217-217.
Song S, Keleher P, Bhattacharjee B, Sussman A.  2010.  Brief announcement: decentralized network bandwidth prediction. Distributed Computing. :198-200.
Marchionini AS, Nation D, Karasik S, Cronnell T, Shneiderman B, Spotfire VDMU, Bederson BB, Data TS, Hochheiser H, Shneiderman B et al..  2003.  Bringing Treasures to the Surface: Previews and Overviews in a Prototype for the Library of Congress National Digital Library. The craft of information visualization: readings and reflections. :388-388.
Khuller S, Kim YA, Wan YCJ.  2010.  Broadcasting on networks of workstations. Algorithmica. 57(4):848-868.

Pages