Publications

Search
Export 1434 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2011
Gordon DS, Hazay C, Katz J, Lindell Y.  2011.  Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.
Kanodia JS, Kim Y, Tomer R, Khan Z, Chung K, Storey JD, Lu H, Keller PJ, Shvartsman SY.  2011.  A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
Kanodia JS, Kim Y, Tomer R, Khan Z, Chung K, Storey JD, Lu H, Keller PJ, Shvartsman SY.  2011.  A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
Kanodia JS, Kim Y, Tomer R, Khan Z, Chung K, Storey JD, Lu H, Keller PJ, Shvartsman SY.  2011.  A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
Kanodia JS, Kim Y, Tomer R, Khan Z, Chung K, Storey JD, Lu H, Keller PJ, Shvartsman SY.  2011.  A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
Katz J, Malka L.  2011.  Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
Kingsford C, Zaslavsky E, Singh M.  2011.  A cost-aggregating integer linear program for motif finding. Journal of Discrete Algorithms. 9(4):326-334.
Song S, Keleher P, Bhattacharjee B, Sussman A.  2011.  Decentralized, accurate, and low-cost network bandwidth prediction. 2011 Proceedings IEEE INFOCOM. :6-10.
Baras JS, Katz J, Altman E.  2011.  Decision and Game Theory for Security: Second International Conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011, Proceedings.
Korpal M, Ell BJ, Buffa FM, Ibrahim T, Blanco MA, Celià-Terrassa T, Mercatali L, Khan Z, Goodarzi H, Hua Y et al..  2011.  Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization. Nature Medicine. 17(9):1101-1108.
Korpal M, Ell BJ, Buffa FM, Ibrahim T, Blanco MA, Celià-Terrassa T, Mercatali L, Khan Z, Goodarzi H, Hua Y et al..  2011.  Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization. Nature Medicine. 17(9):1101-1108.
Korpal M, Ell BJ, Buffa FM, Ibrahim T, Blanco MA, Celià-Terrassa T, Mercatali L, Khan Z, Goodarzi H, Hua Y et al..  2011.  Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization. Nature Medicine. 17(9):1101-1108.
Kumar J, Pillai J, Doermann D.  2011.  Document Image Classification and Labeling using Multiple Instance Learning. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :1059-1063.
Shen C-C, Wang L-H, Cho I, Kim S, Won S, Plishker W, Bhattacharyya SS.  2011.  The DSPCAD Lightweight Dataflow Environment: Introduction to LIDE Version 0.1. Technical Reports from UMIACS.
Huang Y, Malka L, Evans D, Katz J.  2011.  Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.
Huang Y, Shen C, Evans D, Katz J, Shelat A.  2011.  Efficient Secure Computation with Garbled Circuits. Information Systems Security. :28-48.
Deshpande A, Khuller S, Malekian A, Toossi M.  2011.  Energy efficient monitoring in sensor networks. Algorithmica. 59(1):94-114.
Khaladkar M, Smyda M, Hannenhalli S.  2011.  Epigenomic and RNA structural correlates of polyadenylation. RNA Biology. 8(3):529-537.
Gove R, Dunne C, Shneiderman B, Klavans J, Dorr BJ.  2011.  Evaluating visual and statistical exploration of scientific literature networks. 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). :217-224.
Kim H, Benson T, Akella A, Feamster N.  2011.  The Evolution of Network Configuration: A Tale of Two Campuses. Networks. 7:18-18.
Kelley DR, Kingsford C.  2011.  Extracting Between-Pathway Models from E-MAP Interactions Using Expected Graph Compression. Journal of Computational Biology. 18(3):379-390.
Kelley DR, Kingsford C.  2011.  Extracting Between-Pathway Models from E-MAP Interactions Using Expected Graph Compression. Journal of Computational Biology. 18(3):379-390.
Gopalan R, Schwartz WR, Chellappa R, Srivastava A.  2011.  Face Detection. Visual Analysis of HumansVisual Analysis of Humans. :71-90.
Kumar J, Doermann D.  2011.  Fast Rule-line Removal using Integral Images and Support Vector Machines. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :584-588.
Huang Y, Evans D, Katz J, Malka L.  2011.  Faster secure two-party computation using garbled circuits. USENIX Security Symposium.

Pages