Publications
Export 1830 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is D [Clear All Filters]
2003. Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
2009. PrDB: Managing Large-Scale Correlated Probabilistic Databases (Abstract). Scalable Uncertainty ManagementScalable Uncertainty Management. 5785:1-1.
2008. Predictive Modeling-Based Data Collection in Wireless Sensor Networks. Wireless Sensor NetworksWireless Sensor Networks. 4913:34-51.
1996. Quantitative Measurement of the Performance of Raster-to-vector Conversion Algorithms. Graphics Recognition: Methods and ApplicationsGraphics Recognition: Methods and Applications. :57-68.
2008. The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
2008. Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
2011. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
2012. Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
2004. Selective refinement on nested tetrahedral meshes. Geometric Modeling for Scientific VisualizationGeometric Modeling for Scientific Visualization. :329-344.
2009. Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
2001. Statistics Explains Geometrical Optical Illusions. Foundations of Image UnderstandingFoundations of Image Understanding. 628:409-445.
1995. The SVD in Image Restoration. SVD and Signal Processing III: Algorithms, Architectures, and ApplicationsSVD and Signal Processing III: Algorithms, Architectures, and Applications. :315-322.
1998. A Thematic Hierarchy for Efficient Generation from Lexical-Conceptual Structure. Machine Translation and the Information SoupMachine Translation and the Information Soup. 1529:333-343.
2002. Theoretical and Empirical Aspects of a Planner in a Multi-agent Environment. Logics in Artificial Intelligence. 2424:173-185.
2003. Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
1994. Transforming queries from a relational schema to an object schema: A prototype based on F-logic. Methodologies for Intelligent SystemsMethodologies for Intelligent Systems. 869:154-163.
1992. A two-level knowledge representation for machine translation: Lexical semantics and tense/aspect. Lexical Semantics and Knowledge RepresentationLexical Semantics and Knowledge Representation. 627:269-287.
2005. Using NMR Spectroscopy to Monitor Ubiquitin Chain Conformation and Interactions with Ubiquitin‐Binding Domains. Ubiquitin and Protein Degradation, Part B. Volume 399:177-192.
2004. Using Trust in Recommender Systems: An Experimental Analysis. Trust ManagementTrust Management. 2995:221-235.
2005. Visualizing Missing Data: Graph Interpretation User Study. Human-Computer Interaction - INTERACT 2005. 3585:861-872.
2006. Voting with Your Feet: An Investigative Study of the Relationship Between Place Visit Behavior and Preference. UbiComp 2006: Ubiquitous Computing. 4206:333-350.
2010. Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
2010. Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.