Publications
Export 1435 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
1988. Uniform accountability for multiple modes of reasoning. International Journal of Approximate Reasoning. 2(3):233-246.
2007. A unified model explaining the offsets of overlapping and near-overlapping prokaryotic genes. Molecular biology and evolution. 24(9):2091-2091.
2009. A unified approach to scheduling on unrelated parallel machines. J. ACM. 56(5):28:1–28:31-28:1–28:31.
2001. Unforgeable encryption and chosen ciphertext secure modes of operation. Fast Software Encryption. :25-36.
2004. Understanding tuberculosis epidemiology using structured statistical models. Artificial Intelligence in Medicine. 30(3):233-256.
2008. Uncovering Genomic Reassortments among Influenza Strains by Enumerating Maximal Bicliques. IEEE International Conference on Bioinformatics and Biomedicine, 2008. BIBM '08. :223-230.
2004. Ubistatins Inhibit Proteasome-Dependent Degradation by Binding the Ubiquitin Chain. Science. 306(5693):117-120.
2009. UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits. Proceedings of the 27th international conference on Human factors in computing systems. :1043-1052.
1983. The U1 small nuclear RNA-protein complex selectively binds a 5′ splice site in vitro. Cell. 33(2):509-518.
2012. Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.
2005. Two-server password-only authenticated key exchange. Applied Cryptography and Network Security. :175-206.
2011. A Two Degree of Freedom Nanopositioner With Electrothermal Actuator for Decoupled Motion. :447-457.
2004. Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
2004. Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
2008. Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Transactions on Information Systems (TOIS). 27(1):3:1–3:27-3:1–3:27.
2006. Trusted declassification:: high-level policy for a security-typed language. Proceedings of the 2006 workshop on Programming languages and analysis for security. :65-74.
1998. Trends in the early careers of life scientists - Preface and executive summary. Mol Biol Cell. 9(11):3007-3015.
2006. TreePlus: Interactive Exploration of Networks with Enhanced Tree Layouts. Visualization and Computer Graphics, IEEE Transactions on. 12(6):1414-1426.
1999. Transparent communication for distributed objects in Java. Proceedings of the ACM 1999 conference on Java Grande. :160-170.