Publications

Search
Export 1376 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is R  [Clear All Filters]
2011
Narayanan A, Elaine Shi, Rubinstein BIP.  2011.  Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge. :1825-1834.
Vezzulli L, Brettar I, Pezzati E, Reid PC, Colwell RR, Höfle MG, Pruzzo C.  2011.  Long-term effects of ocean warming on the prokaryotic community: evidence from the vibrios. The ISME Journal. 6(1):21-30.
Hasan NA, Chowdhury BW, Rahim N, Sultana M, Shabnam AS, Mai V, Ali A, Morris GJ, Sack BR, Huq A et al..  2011.  Metagenomic 16S rDNA Targeted PCR-DGGE in Determining Bacterial Diversity in Aquatic Ecosystem. Bangladesh Journal of Microbiology. 27(2)
Violi N, Shneiderman B, Hanson A, Rey PJ.  2011.  Motivation for Participation in Online Neighborhood Watch Communities: An Empirical Study Involving Invitation Letters. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :760-765.
Turpie J, Reisner E, Foster JS, Hicks MW.  2011.  MultiOtter: Multiprocess Symbolic Execution. Technical Reports of the Computer Science Department.
Chekuri C, Gal A, Im S, Khuller S, Li J, McCutchen R, Moseley B, Raschid L.  2011.  New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.
Hansen DL, Jacobs DW, Lewis D, Biswas A, Preece J, Rotman D, Stevens E.  2011.  Odd Leaf Out: Improving Visual Recognition with Games. Privacy, security, risk and trust (passat), 2011 ieee third international conference on and 2011 ieee third international conference on social computing (socialcom). :87-94.
Papamanthou C, Tamassia R, Triandopoulos N.  2011.  Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
Bhattacharyya SS, Eker J, Janneck JW, Lucarz C, Mattavelli M, Raulet M.  2011.  Overview of the MPEG Reconfigurable Video Coding Framework. Journal of Signal Processing Systems. 63(2):251-263.
Reddy D, Veeraraghavan A, Chellappa R.  2011.  P2C2: Programmable pixel compressive camera for high speed imaging. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :329-336.
Mundada Y, Ramachandran A, Tariq MB, Feamster N.  2011.  Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks. GT-CS-11-01
Wu S, Elsayed T, Rand W, Raschid L.  2011.  Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
Wu S, Elsayed T, Rand W, Raschid L.  2011.  Predicting author blog channels with high value future posts for monitoring. Proceedings of the Twenty-Fifth Conference on Artificial Intelligence (AAAI).
Elaine Shi, Chan T, Rieffel E, Chow R, Song D.  2011.  Privacy-preserving aggregation of time-series data. 17
Wu S, Rand W, Raschid L.  2011.  Recommendations in social media for brand monitoring. Proceedings of the fifth ACM conference on Recommender systems. :345-348.
Wu S, Rand W, Raschid L.  2011.  Recommendations in social media for brand monitoring. Proceedings of the fifth ACM conference on Recommender systems. :345-348.
Kandel S, Heer J, Plaisant C, Kennedy J, Van Ham F, Riche N H, Weaver C, Lee B, Brodbeck D, Buono P.  2011.  Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Resnik P.  2011.  Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language. Arxiv preprint arXiv:1105.5444.
Mundada Y, Ramachandran A, Feamster N.  2011.  SilverLine: Data and Network Isolation for Cloud Services. 2nd USENIX Workshop on Hot Topics in Cloud Computing.
Ramachandran A, Dasgupta A, Feamster N, Weinberger K.  2011.  Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
Lopez JV, Ledger A, Santiago-Vázquez LZ, Pop M, Sommer DD, Ranzer LK, Feldman RA, Russell GK.  2011.  Suppression subtractive hybridization PCR isolation of cDNAs from a Caribbean soft coral. Electronic Journal of Biotechnology. 14(1):8-9.
Lopez JV, Ledger A, Santiago-Vázquez LZ, Pop M, Sommer DD, Ranzer LK, Feldman RA, Russell GK.  2011.  Suppression subtractive hybridization PCR isolation of cDNAs from a Caribbean soft coral. Electronic Journal of Biotechnology. 14(1):8-9.
Yu M, Rexford J, Sun X, Rao S, Feamster N.  2011.  A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.

Pages