Publications
Export 1435 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is K [Clear All Filters]
2012. InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
2012. InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
2012. Learning Document Structure for Retrieval and Classification. International Conference on Pattern Recognition (ICPR 2012). :1558-1561.
2012. Learning Text-line Segmentation using Codebooks and Graph Partitioning. International Conference on Frontiers in Handwriting Recognition (ICFHR). :63-68.
2012. Learning Text-line Segmentation using Codebooks and Graph Partitioning. International Conference on Frontiers in Handwriting Recognition (ICFHR). :63-68.
2012. Local Segmentation of Touching Characters using Contour based Shape Decomposition. Document Analysis Systems.
2012. Mapping Parameterized Cyclo-static Dataflow Graphs onto Configurable Hardware. Journal of Signal Processing Systems. 66(3):285-301.
2012. Mapping Parameterized Cyclo-static Dataflow Graphs onto Configurable Hardware. Journal of Signal Processing Systems. 66(3):285-301.
2012. Media, Aggregators and the Link Economy: Strategic Hyperlink Formation in Content Networks. Management Science.
2012. Mobile Data Offloading through Opportunistic Communications and Social Participation. Mobile Computing, IEEE Transactions on. 11(5):821-834.
2012. Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
2012. Quantitative measurement of allele‐specific protein expression in a diploid yeast hybrid by LC‐MS. Molecular Systems Biology. 8(1)
2012. Quantitative measurement of allele‐specific protein expression in a diploid yeast hybrid by LC‐MS. Molecular Systems Biology. 8(1)
2012. Quid Pro Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. IEEE Symposium on Security and Privacy.
2012. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
2012. Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
2012. Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
2012. Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
2012. Sharpness Estimation for Document and Scene Images. International Conference on Pattern Recognition (ICPR 2012). :3292-3295.
2012. Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.