Publications

Export 1435 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Reports
Gennaro R, Gertner Y, Katz J.  2002.  Bounds on the efficiency of encryption and digital signatures. 2002-22
Elgot-drapkin J, Gordon D, Kraus S, Miller M, Nirkhe M, Perlis D.  1994.  Calibrating, Counting, Grounding, Grouping. FS-94-03
Keleher PJ, Spring N, Bhattacharjee B.  2007.  Chit-based access control.
Oard D, Dorr BJ, Hackett P, Katsova M.  1998.  A Comparative Study of Knowledge-Based Approaches for Cross-Language.
Kobla V, Doermann D, Rosenfeld A.  1996.  Compressed Video Segmentation. LAMP-TR-001,CFAR-TR-839,CS-TR-3688
Kao TC, Mount D.  1991.  Computing generalized Voronoi diagrams in improved time and space bounds.
Kang H, Roussopoulos N.  1987.  On Cost-effectiveness of a Semijoin in Distributed Query Processing.. ISR-TR-1987-38
Kavetsky R, Gupta SK.  2010.  Developing Autonomy for Unmanned Surface Vehicles by Using Virtual Environments.
Khoo YP, Hicks MW, Foster JS, Sazawal V.  2008.  Directing javascript with arrows (functional pearl). Technical Reports of the Computer Science Department.
Ayan NF, Dorr BJ, Kolak O.  2003.  Domain Tuning of Bilingual Lexicons for MT.
Shen C-C, Wang L-H, Cho I, Kim S, Won S, Plishker W, Bhattacharyya SS.  2011.  The DSPCAD Lightweight Dataflow Environment: Introduction to LIDE Version 0.1. Technical Reports from UMIACS.
Kang H, Shneiderman B, Wolff GJ.  2005.  Dynamic Layout Management in a Multimedia Bulletin Board (2002). Institute for Systems Research Technical Reports.
Ramachandran A, Hao S, Khandelwal H, Feamster N, Vempala S.  2008.  A Dynamic Reputation Service for Spotting Spammers. GT-CS-08-09
JaJa JF, Kim J, Wang Q.  2004.  Efficient Serial and Parallel Algorithms for Querying Large Scale Multidimensional Time Series Data. UMIACS-TR-2004-50
Corrada Bravo H, Eng KH, Keles S, Wahba G, Wright S.  2008.  Estimating Tree-Structured Covariance Matrices via Mixed-Integer Programming with an Application to Phylogenetic Analysis of Gene Expression. 1142
Hwa R, Resnik P, Weinberg A, Kolak O.  2003.  Evaluating Translational Correspondence using Annotation Projection. UMIACS-TR-2003-25
Kang H, Shneiderman B.  2005.  Exploring Personal Media: A Spatial Interface Supporting User-Defined Semantic Regions (2004). Institute for Systems Research Technical Reports.
Konte M, Feamster N, Jung J.  2008.  Fast flux service networks: Dynamics and roles in hosting online scams. GT-CS-08-07
Kobla V, Doermann D, Lin K-I(D), Faloutsos C.  1996.  Feature Normalization for Video Indexing and Retrieval. LAMP-TR-003,CFAR-TR-847,CS-TR-3732
Ramachandran A, Feamster N, Krishnamurthy B, Spatscheck O, Van der Merwe J.  2008.  Fishing for Phishing from the Network Stream. GT-CS-08-08
Katz J.  2002.  A forward-secure public-key encryption scheme.
Remote D U, Kalluri S, Bader DA, Townshend J, JaJa JF, Zhang Z, Fallah-adl H.  2008.  High Performance Computing Algorithms for Land Cover.
Dix J, Kuter U, Nau DS.  2002.  HTN Planning in Answer Set Programming. UMIACS-TR-2002-18
Kules B, Kang H, Plaisant C, Rose A, Shneiderman B.  2005.  Immediate Usability: A Case Study of Public Access Design for a Community Photo Library (2003). Institute for Systems Research Technical Reports.
Kules B, Kang H, Plaisant C, Rose A, Shneiderman B.  2005.  Immediate Usability: A Case Study of Public Access Design for a Community Photo Library (2003). Institute for Systems Research Technical Reports.

Pages