Publications

Export 1435 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Journal Articles
Kraus S, Perlis D, Horty JF.  1991.  Reasoning about ignorance: A note on the Bush-Gorbachev problem. Fundam. Inform.. 15(3-4):325-332.
Haitner I, Horvitz O, Katz J, Koo CY, Morselli R, Shaltiel R.  2009.  Reducing complexity assumptions for statistically-hiding commitment. Journal of cryptology. 22(3):283-310.
Haitner I, Horvitz O, Katz J, Koo CY, Morselli R, Shaltiel R.  2005.  Reducing complexity assumptions for statistically-hiding commitment. Advances in Cryptology–EUROCRYPT 2005. :614-614.
Haitner I, Horvitz O, Katz J, Koo CY, Morselli R, Shaltiel R.  2009.  Reducing complexity assumptions for statistically-hiding commitment. Journal of cryptology. 22(3):283-310.
Haitner I, Horvitz O, Katz J, Koo CY, Morselli R, Shaltiel R.  2005.  Reducing complexity assumptions for statistically-hiding commitment. Advances in Cryptology–EUROCRYPT 2005. :614-614.
Colwell RR, Huq A, Islam SM, Aziz KMA, Yunus M, Khan HN, Mahmud A, Sack BR, Nair GB, Chakraborty J et al..  2003.  Reduction of Cholera in Bangladeshi Villages by Simple Filtration. Proceedings of the National Academy of SciencesPNAS. 100(3):1051-1055.
Yilmaz C, Porter A, Krishna AS, Memon AM, Schmidt DC, Gokhale AS, Natarajan B.  2007.  Reliable Effects Screening: A Distributed Continuous Quality Assurance Process for Monitoring Performance Degradation in Evolving Software Systems. Software Engineering, IEEE Transactions on. 33(2):124-141.
Horvitz E, Getoor L, Guestrin C, Hendler J, Kautz H, Konstan J, Subramanian D, Wellman M.  2010.  REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):87-87.
Horvitz E, Getoor L, Guestrin C, Hendler J, Kautz H, Konstan J, Subramanian D, Wellman M.  2010.  REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):87-87.
Kandel S, Heer J, Plaisant C, Kennedy J, Van Ham F, Riche N H, Weaver C, Lee B, Brodbeck D, Buono P.  2011.  Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
Kandel S, Heer J, Plaisant C, Kennedy J, Van Ham F, Riche N H, Weaver C, Lee B, Brodbeck D, Buono P.  2011.  Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
Kia OE, Doermann D.  2000.  Residual coding in document image compression. Image Processing, IEEE Transactions on. 9(6):961-969.
Kembhavi A, Schwartz WR, Davis LS, others.  2008.  Resource allocation for tracking multiple targets using particle filters. The Eighth International Workshop on Visual Surveillance.
Kreitzberg CB, Shneiderman B.  1993.  Restructuring knowledge for an electronic encyclopedia. Sparks of innovation in human-computer interaction. 615:123-123.
Navlakha S, Schatz MC, Kingsford C.  2009.  Revealing biological modules via graph summarization. Journal of Computational Biology. 16(2):253-264.
Katz J.  2006.  Review of "A Computational Introduction to Number Theory and Algebra by Victor Shoup", Cambridge University Press, 2005. SIGACT News. 37(1):12-13.
Royer EM, Toh CK, Hicks MW, Kakkar P, Moore JT, Hicks MW, Moore JT, Alexander DS, Gunter CA, Nettles S et al..  2000.  A Review of Current Routing Protocols for Ad Hoc. IEEE Personal Communications. 29:156-71.
Katz J.  2012.  Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
Cockburn A, Karlson A, Bederson BB.  2008.  A review of overview+ detail, zooming, and focus+ context interfaces. ACM Computing Surveys (CSUR). 41(1):1-31.
Katz J.  2006.  Review of "Primality Testing in Polynomial Time by Martin Dietzfelbinger", Springer-Verlag, 2004. SIGACT News. 37(1):14-15.
Katz J.  2007.  Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News. 38(3):20-22.
Bender A, Katz J, Morselli R.  2009.  Ring signatures: Stronger definitions, and constructions without random oracles. Journal of Cryptology. 22(1):114-138.
Bender A, Katz J, Morselli R.  2006.  Ring signatures: Stronger definitions, and constructions without random oracles. Theory of Cryptography. :60-79.
Dodis Y, Katz J, Reyzin L, Smith A.  2006.  Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
Chai J, Jimmy Lin, Zadrozny W, Ye Y, Stys-Budzikowska M, Horvath V, Kambhatla N, Wolf C.  2001.  The role of a natural language conversational interface in online sales: A case study. International Journal of Speech Technology. 4(3):285-295.

Pages