Publications

Search
Export 1434 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Book Chapters
Pop M, Kosack D.  2004.  Using the TIGR Assembler in Shotgun Sequencing Projects. Bacterial Artificial Chromosomes. 255:279-294.
Kumar H, Plaisant C, Teittinen M, Shneiderman B.  2003.  Visual Information Management for Network Configuration. The Craft of Information VisualizationThe Craft of Information Visualization. :239-256.
Plaisant C, Marchionini G, Komlodi A.  2003.  Visualizing websites using a hierarchical table of contents browser: WebTOC. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :438-438.
Caprara A, Italiano G, Mohan G, Panconesi A, Srinivasan A.  2000.  Wavelength Rerouting in Optical Networks, or the Venetian Routing Problem. Approximation Algorithms for Combinatorial Optimization. 1913:71-84.
Au T-C, Kuter U, Nau DS.  2005.  Web Service Composition with Volatile Information. The Semantic Web – ISWC 2005. 3729:52-66.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
Bitansky N, Dachman-Soled D, Garg S, Jain A, Kalai YTauman, López-Alt A, Wichs D.  2013.  Why “Fiat-Shamir for Proofs” Lacks a Proof. Theory of Cryptography. :182-201.
Plaisant C, Marchimini G, Bruns T, Komlodi A, Campbell L, Rose A, Ding GM, Beale Jr J, Nolet V, Shneiderman B et al..  2003.  The World's Information in Digital Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :149-149.
Books
Katz J, Yung M.  2007.  Applied cryptography and network security: 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007: proceedings. 4521
Klavans JL, Resnik P.  1996.  The Balancing Act: Combining Symbolic and Statistical Approaches to Language.
Flach P, Matsubara ET, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  On classification, ranking, and probability estimation.
Baras JS, Katz J, Altman E.  2011.  Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings.
Yung M, Katz J.  2010.  Digital Signatures. :192.
Yung M, Katz J.  2008.  Digital Signatures.
Silvester D, Elman H, Kay D, Wathen A.  1999.  Efficient preconditioning of the linearized Navier-Stokes equations.
Kreitzberg CB, Shneiderman B.  1972.  The Elements of FORTRAN Style: Techniques for Effective Programming.
Kreitzberg CB, Shneiderman B.  1990.  FORTRAN Programming: A Spiral Approach.
[Anonymous].  2011.  GameSec'11: Proceedings of the Second international conference on Decision and Game Theory for Security.
Katz J, Lindell Y.  2008.  Introduction to Modern Cryptography.
KJR Liu, W. Trappe W W ZZJMH.  2005.  Multimedia fingerprinting forensics for traitor tracing.
Kanal LN, Agrawala AK.  1973.  Pattern Recognition.
Boyer KL, Sarkar S, Feldman J, Granlund G, Horaud R, Hutchinson S, Jacobs DW, Kak A, Lowe D, Malik J.  1999.  Perceptual Organization in Computer Vision.
[Anonymous].  2009.  Proceedings of the 1st ACM SIGKDD Workshop on Knowledge Discovery from Uncertain Data.
Tilghman S, Astin HS, Brinkley W, Chilton MD, Cummings MP, Ehrenberg RG, Fox MF, Glenn K, Green PJ, Hans S et al..  1998.  Trends in the Early Careers of Life Scientists.
Conference Papers
Chowdhury AR, Chellappa R, Krishnamurthy S, Vo T.  2002.  3D face reconstruction from video using a generic model. Multimedia and Expo, 2002. ICME '02. Proceedings. 2002 IEEE International Conference on. 1:449-452vol.1-449-452vol.1.

Pages