Publications

Export 3364 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Mashima D, Elaine Shi, Chow R, Sarkar P, Li C, Song D.  2011.  Privacy settings from contextual attributes: A case study using Google Buzz. :257-262.
Fayzullin M, V.S. Subrahmanian, Albanese M, Picariello A.  2004.  The priority curve algorithm for video summarization. Proceedings of the 2nd ACM international workshop on Multimedia databases. :28-35.
Albanese M, Fayzullin M, Picariello A, V.S. Subrahmanian.  2006.  The priority curve algorithm for video summarization. Information Systems. 31(7):679-695.
Yoon I-C, Sussman A, Memon AM, Porter A.  2009.  Prioritizing component compatibility tests via user preferences. Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. :29-38.
Cleaveland R, L\üttgen G, Natarajan V, Sims S.  1996.  Priorities for modeling and verifying distributed systems. Tools and Algorithms for the Construction and Analysis of Systems. :278-297.
Zelkowitz MV, Shaw AC, Gannon JD.  1979.  Principles of software engineering and design.
Kim J-S, Andrade H, Sussman A.  2007.  Principles for designing data-/compute-intensive distributed applications and middleware systems for heterogeneous environments. Journal of Parallel and Distributed Computing. 67(7):755-771.
Alexander DS, Menage PB, Keromytis AD, Arbaugh WA, Anagnostakis KG, Smith JM.  2001.  The price of safety in an active network. Journal of Communications and Networks. 3(1):4-18.
Greene S, Marchionini G, Plaisant C, Shneiderman B.  2000.  Previews and overviews in digital libraries: Designing surrogates to support visual information seeking. Journal of the American Society for Information Science. 51(4):380-393.
Mittal P, Papamanthou C, Song D.  2012.  Preserving Link Privacy in Social Network Based Systems. arXiv:1208.6189 [cs].
Yilmaz C, Memon AM, Porter A, Krishna AS, Schmidt DC, Gokhale A, Natarajan B.  2004.  Preserving distributed systems critical properties: a model-driven approach. Software, IEEE. 21(6):32-40.
Hwang E, Prabhakaran B, V.S. Subrahmanian.  2002.  Presentation planning for distributed VoD systems. Knowledge and Data Engineering, IEEE Transactions on. 14(5):1059-1077.
Cleaveland R, Steffen B.  1990.  A preorder for partial process specifications. CONCUR'90 Theories of Concurrency: Unification and Extension. :141-151.
Mount SM, Salz HK.  2000.  Pre-Messenger RNA Processing Factors in the Drosophila Genome. The Journal of Cell BiologyJ Cell Biol. 150(2):F37-F44-F37-F44.
Taylor EM, Martin, M.P, Smits AJ.  2005.  Preliminary Study of the Turbulence Structure in Supersonic Boundary Layers using DNS Data. 35th AIAA Fluid Dynamics Conference.
Shneiderman B.  1993.  Preface to Sparks of Innovation in Human-Computer Interaction. Sparks of innovation in human-computer interaction.
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
Wolski R, Spring N, Hayes J.  1999.  Predicting the CPU availability of time-shared Unix systems on the computational grid. The Eighth International Symposium on High Performance Distributed Computing, 1999. Proceedings. :105-112.
Schulz R, Reggia JA.  2002.  Predicting nearest agent distances in artificial worlds. Artificial life. 8(3):247-264.
Shen E, Elaine Shi, Waters B.  2009.  Predicate Privacy in Encryption Systems. Theory of Cryptography. 5444:457-473.
Shen E, Elaine Shi, Waters B.  2009.  Predicate Privacy in Encryption Systems. Theory of Cryptography. 5444:457-473.
Katz J, Sahai A, Waters B.  2008.  Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology. :146-162.
Elman H, Schultz MH.  1986.  Preconditioning by Fast Direct Methods for Nonself-Adjoint Nonseparable Elliptic Equations. SIAM Journal on Numerical Analysis. 23(1):44-57.
Sen P, Deshpande A, Getoor L.  2009.  PrDB: managing and exploiting rich correlations in probabilistic databases. The VLDB Journal. 18(5):1065-1090.
Son SH, Agrawala AK.  1986.  Practicality of non-interfering checkpoints in distributed database systems. IEEE Real-Time Systems Symposium, New Orleans, Louisiana. :234-241.

Pages