Publications
Export 1734 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is M [Clear All Filters]
2011. Computing morse decompositions for triangulated terrains: an analysis and an experimental evaluation. Image Analysis and Processing–ICIAP 2011. :565-574.
2011. Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
2011. Correcting Errors in Digital Lexicographic Resources Using a Dictionary Manipulation Language. Electronic lexicography in the 21st century: new applications for new users (eLEX2011). :297-301.
2011. Cross Language Entity Linking. IJCNLP: International Joint Conference on Natural Language Processing.
2011. Cross Language Entity Linking. IJCNLP: International Joint Conference on Natural Language Processing.
2011. Declarative analysis of noisy information networks. 2011 IEEE 27th International Conference on Data Engineering Workshops (ICDEW). :106-111.
2011. Developing a Single Model and Test Prioritization Strategies for Event-Driven Software. Software Engineering, IEEE Transactions on. 37(1):48-64.
2011. Direct targeting of Sec23a by miR-200s influences cancer cell secretome and promotes metastatic colonization. Nature Medicine. 17(9):1101-1108.
2011. Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
2011. Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
2011. Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.
2011. Exploiting statistical and relational information on the web and in social media. Proceedings of the fourth ACM international conference on Web search and data mining. :9-10.
2011. A family of abstract interpretations for static analysis of concurrent higher-order programs. arXiv:1103.5167 [cs].