Publications
Export 1435 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is K [Clear All Filters]
2011. Communicating with Caps: Managing Usage Caps in Home Networks. SIGCOMM Comput. Commun. Rev.. 41(4):470-471.
2011. Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.
2011. A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
2011. A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
2011. A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
2011. A computational statistics approach for estimating the spatial range of morphogen gradients. Development. 138(22):4867-4874.
2011. Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
2011. A cost-aggregating integer linear program for motif finding. Journal of Discrete Algorithms. 9(4):326-334.
2011. Decentralized, accurate, and low-cost network bandwidth prediction. 2011 Proceedings IEEE INFOCOM. :6-10.
2011. Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization. Nature Medicine. 17(9):1101-1108.
2011. Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization. Nature Medicine. 17(9):1101-1108.
2011. Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization. Nature Medicine. 17(9):1101-1108.
2011. Document Image Classification and Labeling using Multiple Instance Learning. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :1059-1063.
2011. The DSPCAD Lightweight Dataflow Environment: Introduction to LIDE Version 0.1. Technical Reports from UMIACS.
2011. Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.
2011. Evaluating visual and statistical exploration of scientific literature networks. 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). :217-224.
2011. Extracting Between-Pathway Models from E-MAP Interactions Using Expected Graph Compression. Journal of Computational Biology. 18(3):379-390.
2011. Extracting Between-Pathway Models from E-MAP Interactions Using Expected Graph Compression. Journal of Computational Biology. 18(3):379-390.
2011. Fast Rule-line Removal using Integral Images and Support Vector Machines. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :584-588.