Publications
Export 1435 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is K [Clear All Filters]
1993. Remote direct manipulation: A case study of a telemedicine workstation. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :51-51.
2007. Randomized Algorithms and Probabilistic Analysis in Wireless Networking. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. 4665:54-57.
2007. Probabilistic Relational Models. Introduction to Statistical Relational LearningIntroduction to Statistical Relational Learning. :129-129.
2004. PRAM-On-Chip: A Quest for Not-So-Obvious Non-obviousness. Mathematical Foundations of Computer Science 2004Mathematical Foundations of Computer Science 2004. 3153:104-105.
2004. PRAM-On-Chip: A Quest for Not-So-Obvious Non-obviousness. Mathematical Foundations of Computer Science 2004Mathematical Foundations of Computer Science 2004. 3153:104-105.
2003. Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
2003. Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
2009. Planning for Interactions among Autonomous Agents. Programming Multi-Agent Systems. 5442:1-23.
2001. Perceptual organization as generic object recognition. From Fragments to Objects Segmentation and Grouping in VisionFrom Fragments to Objects Segmentation and Grouping in Vision. Volume 130:295-329.
2003. The people in digital libraries: Multifaceted approaches to assessing needs and impact. Digital library use: Social practice in design and evaluationDigital library use: Social practice in design and evaluation. :119-160.
2013. Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography and Data Security. :258-274.
1999. Network Programming Using PLAN. Internet Programming LanguagesInternet Programming Languages. 1686:127-143.
2014. On Minimal Assumptions for Sender-Deniable Public Key Encryption. Public-Key Cryptography – PKC 2014. :574-591.
2004. An MCMC-Based Particle Filter for Tracking Multiple Interacting Targets. Computer Vision - ECCV 2004. :279-290.
1999. LifeLines: Visualizing Personal Histories. Readings in Information Visualization: Using Vision to ThinkReadings in Information Visualization: Using Vision to Think. :285-285.
1998. Lexical Selection for Cross-Language Applications: Combining LCS with WordNet. Machine Translation and the Information SoupMachine Translation and the Information Soup. 1529:438-447.
1999. Latent Semantic Indexing via a Semi-Discrete Matrix Decomposition. The Mathematics of Information Coding, Extraction and DistributionThe Mathematics of Information Coding, Extraction and Distribution. :73-80.
2010. On k-Column Sparse Packing Programs. Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization. 6080:369-382.
2006. Integrating Video Information over Time. Example: Face Recognition from Video. Cognitive Vision SystemsCognitive Vision Systems. 3948:127-144.
2005. Information Visualization and the Challenge of Universal Usability. Exploring GeovisualizationExploring Geovisualization. :53-82.
2004. Information Gathering During Planning for Web Service Composition. The Semantic Web – ISWC 2004. 3298:335-349.
2008. Implicit Flows: Can’t Live with ‘Em, Can’t Live without ‘Em. Information Systems SecurityInformation Systems Security. 5352:56-70.
2011. Image and Video-Based Biometrics. Visual Analysis of HumansVisual Analysis of Humans. :437-454.
2004. iCLEF 2003 at Maryland: Translation Selection and Document Selection. Comparative Evaluation of Multilingual Information Access SystemsComparative Evaluation of Multilingual Information Access Systems. 3237:231-265.