Publications
Export 1435 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is K [Clear All Filters]
1991. Reasoning about ignorance: A note on the Bush-Gorbachev problem. Fundam. Inform.. 15(3-4):325-332.
2009. Reducing complexity assumptions for statistically-hiding commitment. Journal of cryptology. 22(3):283-310.
2005. Reducing complexity assumptions for statistically-hiding commitment. Advances in Cryptology–EUROCRYPT 2005. :614-614.
2009. Reducing complexity assumptions for statistically-hiding commitment. Journal of cryptology. 22(3):283-310.
2005. Reducing complexity assumptions for statistically-hiding commitment. Advances in Cryptology–EUROCRYPT 2005. :614-614.
2003. Reduction of Cholera in Bangladeshi Villages by Simple Filtration. Proceedings of the National Academy of SciencesPNAS. 100(3):1051-1055.
2007. Reliable Effects Screening: A Distributed Continuous Quality Assurance Process for Monitoring Performance Degradation in Evolving Software Systems. Software Engineering, IEEE Transactions on. 33(2):124-141.
2010. REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):87-87.
2010. REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):87-87.
2011. Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
2011. Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
2000. Residual coding in document image compression. Image Processing, IEEE Transactions on. 9(6):961-969.
2008. Resource allocation for tracking multiple targets using particle filters. The Eighth International Workshop on Visual Surveillance.
1993. Restructuring knowledge for an electronic encyclopedia. Sparks of innovation in human-computer interaction. 615:123-123.
2009. Revealing biological modules via graph summarization. Journal of Computational Biology. 16(2):253-264.
2006. Review of "A Computational Introduction to Number Theory and Algebra by Victor Shoup", Cambridge University Press, 2005. SIGACT News. 37(1):12-13.
2012. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
2008. A review of overview+ detail, zooming, and focus+ context interfaces. ACM Computing Surveys (CSUR). 41(1):1-31.
2006. Review of "Primality Testing in Polynomial Time by Martin Dietzfelbinger", Springer-Verlag, 2004. SIGACT News. 37(1):14-15.
2007. Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News. 38(3):20-22.
2009. Ring signatures: Stronger definitions, and constructions without random oracles. Journal of Cryptology. 22(1):114-138.
2006. Ring signatures: Stronger definitions, and constructions without random oracles. Theory of Cryptography. :60-79.
2006. Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
2001. The role of a natural language conversational interface in online sales: A case study. International Journal of Speech Technology. 4(3):285-295.