Publications

Export 1435 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2012
Hunter S, Jones P, Mitchell A, Apweiler R, Attwood TK, Bateman A, Bernard T, Binns D, Bork P, Burge S et al..  2012.  InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
Hunter S, Jones P, Mitchell A, Apweiler R, Attwood TK, Bateman A, Bernard T, Binns D, Bork P, Burge S et al..  2012.  InterPro in 2011: new developments in the family and domain prediction database.. Nucleic Acids Res. 40(Database issue):D306-12.
Kumar J, Ye P, Doermann D.  2012.  Learning Document Structure for Retrieval and Classification. International Conference on Pattern Recognition (ICPR 2012). :1558-1561.
Kang L, Kumar J, Ye P, Doermann D.  2012.  Learning Text-line Segmentation using Codebooks and Graph Partitioning. International Conference on Frontiers in Handwriting Recognition (ICFHR). :63-68.
Kang L, Kumar J, Ye P, Doermann D.  2012.  Learning Text-line Segmentation using Codebooks and Graph Partitioning. International Conference on Frontiers in Handwriting Recognition (ICFHR). :63-68.
Kim H, Voellmy A, Burnett S, Feamster N, Clark R.  2012.  Lithium: Event-Driven Network Control. GT-CS-12-03
Kang L, Doermann D, Cao H, Prasad R, Natarajan P.  2012.  Local Segmentation of Touching Characters using Contour based Shape Decomposition. Document Analysis Systems.
Kee H, Shen C-C, Bhattacharyya SS, Wong I, Rao Y, Kornerup J.  2012.  Mapping Parameterized Cyclo-static Dataflow Graphs onto Configurable Hardware. Journal of Signal Processing Systems. 66(3):285-301.
Kee H, Shen C-C, Bhattacharyya SS, Wong I, Rao Y, Kornerup J.  2012.  Mapping Parameterized Cyclo-static Dataflow Graphs onto Configurable Hardware. Journal of Signal Processing Systems. 66(3):285-301.
Dellarocas C, Katona Z, Rand W.  2012.  Media, Aggregators and the Link Economy: Strategic Hyperlink Formation in Content Networks. Management Science.
Han B, Hui P, Kumar VSA, Marathe MV, Shao J, Srinivasan A.  2012.  Mobile Data Offloading through Opportunistic Communications and Social Participation. Mobile Computing, IEEE Transactions on. 11(5):821-834.
Barrett C, Beckman R, Bisset K, Chen J, DuBois T, Eubank S, Kumar AVS, Lewis B, Marathe MV, Srinivasan A et al..  2012.  Optimizing epidemic protection for socially essential workers. Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium. :31-40.
Khan Z, Bloom JS, Amini S, Singh M, Perlman DH, Caudy AA, Kruglyak L.  2012.  Quantitative measurement of allele‐specific protein expression in a diploid yeast hybrid by LC‐MS. Molecular Systems Biology. 8(1)
Khan Z, Bloom JS, Amini S, Singh M, Perlman DH, Caudy AA, Kruglyak L.  2012.  Quantitative measurement of allele‐specific protein expression in a diploid yeast hybrid by LC‐MS. Molecular Systems Biology. 8(1)
Huang Y, Katz J, Evans D.  2012.  Quid Pro Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. IEEE Symposium on Security and Privacy.
Katz J.  2012.  Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
Konte M, Feamster N.  2012.  Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D.  2012.  Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
Dachman-Soled D, Kalai YTauman.  2012.  Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
Kumar J, Chen F, Doermann D.  2012.  Sharpness Estimation for Document and Scene Images. International Conference on Pattern Recognition (ICPR 2012). :3292-3295.
Huttenhower C, Gevers D, Knight R, Abubucker S, Badger JH, Chinwalla AT, Creasy HH, Earl AM, Fitzgerald MG, Fulton RS et al..  2012.  Structure, function and diversity of the healthy human microbiome. Nature. 486:207-214.
Katz J, MacKenzie P, Taban G, Gligor V.  2012.  Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.
Ye P, Kumar J, Kang L, Doermann D.  2012.  Unsupervised Feature Learning Framework for No-reference Image Quality Assessment. CVPR.
Ye P, Kumar J, Kang L, Doermann D.  2012.  Unsupervised Feature Learning Framework for No-reference Image Quality Assessment. CVPR.
Katz J.  2012.  Which Languages Have 4-Round Zero-Knowledge Proofs? Journal of cryptology. 25(1):41-56.

Pages