Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Conference Papers
Meyer R, Cukier M.  2006.  Assessing the Attack Threat due to IRC Channels. :467-472.
Sinha K, Martin, M.P, Candler GV.  2000.  Assessment of Temperature Fluctuation Models for RANS Simulations of Hypersonic Reacting Flows. 38th AIAA Aerospace Sciences Meeting and Exhibit.
Sinha K, Candler GV, Martin, M.P.  2001.  Assessment of the k-epsilon turbulence model for compressible flows using direct simulation data. 39th AIAA Aerospace Sciences Meeting and Exhibit.
Webber W, Oard D, Scholer F, Hedin B.  2010.  Assessor error in stratified evaluation. Proceedings of the 19th ACM international conference on Information and knowledge management. :539-548.
El-Alfy H, Jacobs DW, Davis LS.  2009.  Assigning cameras to subjects in video surveillance systems. Robotics and Automation, 2009. ICRA '09. IEEE International Conference on. :837-843.
Chang T-H, Tom Yeh, Miller R.  2011.  Associating the visual representation of user interfaces with their internal structures and metadata. Proceedings of the 24th annual ACM symposium on User interface software and technology. :245-256.
Voll K, Tom Yeh, Dahl V.  2000.  An assumptive logic programming methodology for parsing. Tools with Artificial Intelligence, 2000. ICTAI 2000. Proceedings. 12th IEEE International Conference on. :11-18.
Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security. :1-10.
Zotkin DN, Keleher PJ, Perkovic D.  2000.  Attacking the bottlenecks of backfilling schedulers. Cluster Computing.
M. Wu, Liu B.  1999.  Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
Haritaoglu I, Cozzi A, Koons D, Flickner M, Zotkin DN, Yacoob Y.  2001.  Attentive toys. International Conference on Multimedia and Expo. 22:25-25.
Joo S-W, Chellappa R.  2006.  Attribute Grammar-Based Event Recognition and Anomaly Detection. Computer Vision and Pattern Recognition Workshop, 2006. CVPRW '06. Conference on. :107-107.
Zotkin DN, Duraiswami R, Davis LS, Haritaoglu I.  2000.  An audio-video front-end for multimedia applications. 2000 IEEE International Conference on Systems, Man, and Cybernetics. 2:786-791vol.2-786-791vol.2.
Lieberman MD, Sankaranarayanan J, Samet H, Sperling J.  2008.  Augmenting spatio-textual search with an infectious disease ontology. Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International Conference on. :266-269.
Papamanthou C, Tamassia R, Triandopoulos N.  2008.  Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
Ramachandran AV, Feamster N.  2008.  Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Elaine Shi, Song Z.  2010.  Authentication in the clouds: a framework and its application to mobile users. :1-6.
Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities. :10pp.-148-10pp.-148.
Chung I-H, Hollingsworth J.  2004.  Automated cluster-based Web service performance tuning. 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. :36-44.
Alva U, Gupta SK, Gupta RK.  2000.  Automated design of sheet metal bending tools.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Gu R, Piat J, Raulet M, Janneck JW, Bhattacharyya SS.  2010.  Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP). :265-272.
Brooks PA, Memon AM.  2007.  Automated gui testing guided by usage profiles. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :333-342.
Alva U, Gupta SK.  1999.  Automated punch shape synthesis for sheet metal bending operations.
Arbaugh WA, Keromytis AD, Farber DJ, Smith JM.  1998.  Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.

Pages