Publications
Export 1435 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is K [Clear All Filters]
2001. Unforgeable encryption and chosen ciphertext secure modes of operation. Fast Software Encryption. :25-36.
2009. A unified approach to scheduling on unrelated parallel machines. J. ACM. 56(5):28:1–28:31-28:1–28:31.
2007. A unified model explaining the offsets of overlapping and near-overlapping prokaryotic genes. Molecular biology and evolution. 24(9):2091-2091.
1988. Uniform accountability for multiple modes of reasoning. International Journal of Approximate Reasoning. 2(3):233-246.
2007. Universally composable multi-party computation using tamper-proof hardware. Advances in Cryptology-EUROCRYPT 2007. :115-128.
2008. Universally composable multi-party computation with an unreliable common reference string. Theory of Cryptography. :142-154.
2005. Universally composable password-based key exchange. Advances in Cryptology–Eurocrypt 2005. :557-557.
2005. Unsupervised learning applied to progressive compression of time-dependent geometry. Computers & Graphics. 29(3):451-461.
2002. The use of speech retrieval systems: a study design. Information retrieval techniques for speech applications. :86-93.
2003. User interface evaluation and empirically-based evolution of a prototype experience management tool. Software Engineering, IEEE Transactions on. 29(9):838-850.
1997. User Interfaces for a Complex Robotic Task: A Comparison of Tiles vs. Overlapped Windows. Institute for Systems Research Technical Reports.
2008. Users can change their web search tactics: Design guidelines for categorized overviews. Information Processing & Management. 44(2):463-484.
2010. Using friendship ties and family circles for link prediction. Advances in Social Network Mining and Analysis. :97-113.
1995. Using synthetic perturbations and statistical screening to assay shared-memory programs. Information processing letters. 54(3):147-153.
2004. Validating quality of service for reusable software via model-integrated distributed continuous quality assurance. Software Reuse: Methods, Techniques, and Tools. :286-295.
2014. Validation of high throughput sequencing and microbial forensics applications. Investigative Genetics. 5(1):9.
2004. Variation of toxigenic Vibrio cholerae O1 in the aquatic environment of Bangladesh and its correlation with the clinical strains. Microbiology and immunology. 48(10):773-777.
2008. Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
2008. Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
2008. Variational Bayes via Propositionalization. Probabilistic, Logical and Relational Learning-A Further Synthesis.
2011. Vehicle Detection Using Partial Least Squares. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 33(6):1250-1265.