Publications

Export 1734 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is M  [Clear All Filters]
2011
Vitali M, De Floriani L, Magillo P.  2011.  Computing morse decompositions for triangulated terrains: an analysis and an experimental evaluation. Image Analysis and Processing–ICIAP 2011. :565-574.
Katz J, Malka L.  2011.  Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
Zajic D, Maxwell M, Doermann D, Rodrigues P, Bloodgood M.  2011.  Correcting Errors in Digital Lexicographic Resources Using a Dictionary Manipulation Language. Electronic lexicography in the 21st century: new applications for new users (eLEX2011). :297-301.
McNamee P, Mayfield J, Lawrie D, Oard D, Doermann D.  2011.  Cross Language Entity Linking. IJCNLP: International Joint Conference on Natural Language Processing.
McNamee P, Mayfield J, Lawrie D, Oard D, Doermann D.  2011.  Cross Language Entity Linking. IJCNLP: International Joint Conference on Natural Language Processing.
McNamee P, Mayfield J, Oard D, Doermann D, Xu T, Wu K.  2011.  Cross-Language Entity Linking in Maryland during a Hurricane. TAC.
McNamee P, Mayfield J, Oard D, Doermann D, Xu T, Wu K.  2011.  Cross-Language Entity Linking in Maryland during a Hurricane. TAC.
Moustafa WE, Namata G, Deshpande A, Getoor L.  2011.  Declarative analysis of noisy information networks. 2011 IEEE 27th International Conference on Data Engineering Workshops (ICDEW). :106-111.
Bryce RC, Sampath S, Memon AM.  2011.  Developing a Single Model and Test Prioritization Strategies for Event-Driven Software. Software Engineering, IEEE Transactions on. 37(1):48-64.
Korpal M, Ell BJ, Buffa FM, Ibrahim T, Blanco MA, Celià-Terrassa T, Mercatali L, Khan Z, Goodarzi H, Hua Y et al..  2011.  Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization. Nature Medicine. 17(9):1101-1108.
Ma K-K, Yit Phang K, Foster JS, Hicks MW.  2011.  Directed Symbolic Execution. Static AnalysisStatic Analysis. 6887:95-111.
Mesmoudi MM, De Floriani L, Magillo P.  2011.  Discrete Curvature Estimators: an Experimental Evaluation. DISI-TR-11-12
Mesmoudi MM, De Floriani L, Magillo P.  2011.  Discrete Curvature Estimators: an Experimental Evaluation. DISI-TR-11-12
Wagstrom P, Martino J, von Kaenel J, Chetty M, Thomas J, Jones L.  2011.  A Dive into Online Community Properties. CSCW '11. :725-728.
Maniatis P, Akhawe D, Fall K, Elaine Shi, McCamant S, Song D.  2011.  Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
Maniatis P, Akhawe D, Fall K, Elaine Shi, McCamant S, Song D.  2011.  Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
Mardziel P, Magill S, Hicks MW, Srivatsa M.  2011.  Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
Mardziel P, Magill S, Hicks MW, Srivatsa M.  2011.  Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
Huang Y, Malka L, Evans D, Katz J.  2011.  Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.
Brefeld U, Getoor L, Macskassy SA.  2011.  Eighth workshop on mining and learning with graphs. SIGKDD Explor. Newsl.. 12(2):63-65.
Deshpande A, Khuller S, Malekian A, Toossi M.  2011.  Energy efficient monitoring in sensor networks. Algorithmica. 59(1):94-114.
Getoor L, Mihalkova L.  2011.  Exploiting statistical and relational information on the web and in social media. Proceedings of the fourth ACM international conference on Web search and data mining. :9-10.
Gopalan R, Schwartz WR, Chellappa R, Srivastava A.  2011.  Face Detection. Visual Analysis of HumansVisual Analysis of Humans. :71-90.
Might M, Van Horn D.  2011.  A family of abstract interpretations for static analysis of concurrent higher-order programs. arXiv:1103.5167 [cs].
Huang Y, Evans D, Katz J, Malka L.  2011.  Faster secure two-party computation using garbled circuits. USENIX Security Symposium.

Pages