Publications

Search
Export 1434 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Lee SHee, Kalejta RF, Kerry J, Semmes OJohn, O’Connor CM, Khan Z, Garcia BA, Shenk T, Murphy E.  2012.  BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Ko MY, Murthy PK, Bhattacharyya SS.  2007.  Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls. ACM Transactions on Embedded Computing Systems (TECS). 6(2):14–es-14–es.
Brodský T, Fermüller C, Aloimonos Y.  1998.  Beyond the Epipolar Constraint: Integrating 3D Motion and Structure Estimation. 3D Structure from Multiple Images of Large-Scale Environments3D Structure from Multiple Images of Large-Scale Environments. 1506:109-123.
Kolda TG, O'Leary DP, Nazareth L.  1998.  BFGS with Update Skipping and Varying Memory. SIAM Journal on Optimization. 8(4):1060-1083.
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Kanungo T, Resnik P, Mao S, Kim DW, Zheng Q.  2005.  The Bible and multilingual optical character recognition. Communications of the ACM. 48(6):124-130.
Kanungo T, Resnik P, Mao S, Kim DW, Zheng Q.  2005.  The Bible and multilingual optical character recognition. Communications of the ACM. 48(6):124-130.
Kanungo T, Resnik P.  1998.  The Bible, Truth, and Multilingual OCR Evaluation.
Khuller S, Vishkin U.  1994.  Biconnectivity approximations and graph carvings. Journal of the ACM (JACM). 41(2):214-235.
Kustanowitz J, Shneiderman B.  2005.  Bi-Level Hierarchical Layouts for Photo Libraries: Algorithms for Design Optimization with Quantum Content. Institute for Systems Research Technical Reports.
Katz J.  2004.  Binary tree encryption: Constructions and applications. Information Security and Cryptology-ICISC 2003. :1-11.
Golubchik L, Cheng WC, Chou C-F, Khuller S, Samet H, Wan JC.  2003.  Bistro: a scalable and secure data transfer service for digital government applications. Commun. ACM. 46(1):50-51.
Golubchik L, Cheng WC, Chou C-F, Khuller S, Samet H, Wan JC.  2003.  Bistro: a scalable and secure data transfer service for digital government applications. Communications of the ACM. 46(1):50-51.
Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
Zhang Z, Klassen E, Srivastava A, Turaga P, Chellappa R.  2011.  Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
Hwa R, Resnik P, Weinberg A, Cabezas C, Kolak O.  2005.  Bootstrapping parsers via syntactic projection across parallel texts. Nat. Lang. Eng.. 11(3):311-325.
Horvitz O, Katz J.  2010.  Bounds on the efficiency of black-box commitment schemes. Theoretical Computer Science. 411(10):1251-1260.
Horvitz O, Katz J.  2005.  Bounds on the efficiency of black-box commitment schemes. Automata, Languages and Programming. :62-62.
Gennaro R, Gertner Y, Katz J.  2002.  Bounds on the efficiency of encryption and digital signatures. 2002-22
Gennaro R, Gertner Y, Katz J, Trevisan L.  2005.  Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing. 35(1):217-217.
Katz J.  2008.  Bridging game theory and cryptography: recent results and future directions. Proceedings of the 5th conference on Theory of cryptography. :251-272.
Song S, Keleher P, Bhattacharjee B, Sussman A.  2010.  Brief announcement: decentralized network bandwidth prediction. Distributed Computing. :198-200.
Plaisant C, Marchionini G, Bruns T, Komlodi A, Campbell L.  1997.  Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program. Proceedings of the SIGCHI conference on Human factors in computing systems. :518-525.
Marchionini AS, Nation D, Karasik S, Cronnell T, Shneiderman B, Spotfire VDMU, Bederson BB, Data TS, Hochheiser H, Shneiderman B et al..  2003.  Bringing Treasures to the Surface: Previews and Overviews in a Prototype for the Library of Congress National Digital Library. The craft of information visualization: readings and reflections. :388-388.

Pages