Publications
Export 1435 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
2012. BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
2011. Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
2007. Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls. ACM Transactions on Embedded Computing Systems (TECS). 6(2):14–es-14–es.
1998. Beyond the Epipolar Constraint: Integrating 3D Motion and Structure Estimation. 3D Structure from Multiple Images of Large-Scale Environments3D Structure from Multiple Images of Large-Scale Environments. 1506:109-123.
2012. #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
2005. The Bible and multilingual optical character recognition. Communications of the ACM. 48(6):124-130.
2005. The Bible and multilingual optical character recognition. Communications of the ACM. 48(6):124-130.
2005. Bi-Level Hierarchical Layouts for Photo Libraries: Algorithms for Design Optimization with Quantum Content. Institute for Systems Research Technical Reports.
2004. Binary tree encryption: Constructions and applications. Information Security and Cryptology-ICISC 2003. :1-11.
2003. Bistro: a scalable and secure data transfer service for digital government applications. Commun. ACM. 46(1):50-51.
2003. Bistro: a scalable and secure data transfer service for digital government applications. Communications of the ACM. 46(1):50-51.
2009. On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
2011. Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
2005. Bootstrapping parsers via syntactic projection across parallel texts. Nat. Lang. Eng.. 11(3):311-325.
2010. Bounds on the efficiency of black-box commitment schemes. Theoretical Computer Science. 411(10):1251-1260.
2005. Bounds on the efficiency of black-box commitment schemes. Automata, Languages and Programming. :62-62.
2005. Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing. 35(1):217-217.
2008. Bridging game theory and cryptography: recent results and future directions. Proceedings of the 5th conference on Theory of cryptography. :251-272.
2010. Brief announcement: decentralized network bandwidth prediction. Distributed Computing. :198-200.
1997. Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program. Proceedings of the SIGCHI conference on Human factors in computing systems. :518-525.
2003. Bringing Treasures to the Surface: Previews and Overviews in a Prototype for the Library of Congress National Digital Library. The craft of information visualization: readings and reflections. :388-388.