Publications

Export 124 results:
Author [ Title(Desc)] Type Year
Filters: Keyword is Computer science  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
N
Haeupler B, Saha B, Srinivasan A.  2010.  New Constructive Aspects of the Lovasz Local Lemma. 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS). :397-406.
O
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Li Y, Long PM, Srinivasan A.  2001.  The one-inclusion graph algorithm is near-optimal for the prediction model of learning. IEEE Transactions on Information Theory. 47(3):1257-1261.
Chang C, Kurc T, Sussman A, Saltz J.  2000.  Optimizing retrieval and processing of multi-dimensional scientific datasets. Parallel and Distributed Processing Symposium, 2000. IPDPS 2000. Proceedings. 14th International. :405-410.
Shneiderman B, Wattenberg M.  2001.  Ordered treemap layouts. IEEE Symposium on Information Visualization, 2001. INFOVIS 2001. :73-78.
P
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Hua KA, Hannenhalli S.  1991.  Parallel transitive closure computations using topological sort. , Proceedings of the First International Conference on Parallel and Distributed Information Systems, 1991. :122-129.
Soffer A, Samet H, Zotkin DN.  1998.  Pictorial query trees for query specification in image databases. Fourteenth International Conference on Pattern Recognition, 1998. Proceedings. 1:919-921vol.1-919-921vol.1.
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V.  2004.  Plan Databases: Model and Algebra. Foundations of Information and Knowledge Systems. 2942:302-319.
Au T-C, Kuter U, Nau DS.  2009.  Planning for Interactions among Autonomous Agents. Programming Multi-Agent Systems. 5442:1-23.
Dix J, Kuter U, Nau DS.  2003.  Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
Shen E, Elaine Shi, Waters B.  2009.  Predicate Privacy in Encryption Systems. Theory of Cryptography. 5444:457-473.
Xu Y, Ji H, Fermüller C.  2006.  A Projective Invariant for Textures. 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2:1932-1939.
R
Seo J, Shneiderman B.  2004.  A Rank-by-Feature Framework for Unsupervised Multidimensional Data Exploration Using Low Dimensional Projections. IEEE Symposium on Information Visualization, 2004. INFOVIS 2004. :65-72.
Sen P, Deshpande A, Getoor L.  2007.  Representing Tuple and Attribute Uncertainty in Probabilistic Databases. Seventh IEEE International Conference on Data Mining Workshops, 2007. ICDM Workshops 2007. :507-512.
Banerjee S, Lee S, Bhattacharjee B, Srinivasan A.  2006.  Resilient multicast using overlays. IEEE/ACM Transactions on Networking. 14(2):237-248.
Konte M, Feamster N.  2012.  Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
Ogale AS, Aloimonos Y.  2005.  Robust Contrast Invariant Stereo Correspondence. Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005. ICRA 2005. :819-824.
S
Andrade H, Kurc T, Sussman A, Saltz J.  2002.  Scheduling multiple data visualization query workloads on a shared memory machine. Parallel and Distributed Processing Symposium., Proceedings International, IPDPS 2002, Abstracts and CD-ROM. :11-18.
Hicks MW, Keromytis AD, Smith JM.  2002.  A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
Yuan Y, Arbaugh WA.  2003.  A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.
Guerra-Filho G, Aloimonos Y.  2006.  A Sensory-Motor Language for Human Activity Understanding. 2006 6th IEEE-RAS International Conference on Humanoid Robots. :69-75.
Bethencourt J, Elaine Shi, Song D.  2010.  Signatures of Reputation. Financial Cryptography and Data Security. 6052:400-407.
Borah M, Bajwa RS, Hannenhalli S, Irwin MJ.  1994.  A SIMD solution to the sequence comparison problem on the MGAP. International Conference on Application Specific Array Processors, 1994. Proceedings. :336-345.
Kaâniche M, Kanoun K, Cukier M, Martini M.  1994.  Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.

Pages