Publications

Export 1435 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2011
Huang Y, Evans D, Katz J, Malka L.  2011.  Faster secure two-party computation using garbled circuits. USENIX Security Symposium.
[Anonymous].  2011.  GameSec'11: Proceedings of the Second international conference on Decision and Game Theory for Security.
Plishker W, Sane N, Kiemb M, Bhattacharyya SS.  2011.  Heterogeneous Design in Functional DIF. Transactions on High-Performance Embedded Architectures and Compilers IV. :391-408.
Patel VM, Pillai JK, Chellappa R.  2011.  Image and Video-Based Biometrics. Visual Analysis of HumansVisual Analysis of Humans. :437-454.
Katz J, Schröder D, Yerukhimovich A.  2011.  Impossibility of blind signatures from one-way permutations. Theory of Cryptography. :615-629.
Kawahara AY, Ohshima I, Kawakita A, Regier JC, Mitter C, Cummings MP, Davis DR, Wagner DL, De Prinis J, Lopez-Vaamonde C.  2011.  Increased gene sampling provides stronger support for higher-level groups within gracillariid leaf mining moths and relatives (Lepidoptera: Gracillariidae). BMC Evol Biol. 11:182
Kawahara AY, Ohshima I, Kawakita A, Regier JC, Mitter C, Cummings MP, Davis DR, Wagner DL, De Prinis J, Lopez-Vaamonde C.  2011.  Increased gene sampling provides stronger support for higher-level groups within gracillariid leaf mining moths and relatives (Lepidoptera: Gracillariidae). BMC Evol Biol. 11:182
Kerren A, Plaisant C, Stasko JT.  2011.  Information Visualization: State of the Field and New Research Directions. Information VisualizationInformation Visualization. 10(4):269-270.
Kirschner AKT, Schauer S, Steinberger B, Wilhartitz I, Grim CJ, Huq A, Colwell RR, Herzig A, Sommer R.  2011.  Interaction of Vibrio cholerae non-O1/non-O139 with Copepods, Cladocerans and Competing Bacteria in the Large Alkaline Lake Neusiedler See, Austria. Microbial ecology. 61(3):496-506.
Tzoukermann E, Neumann J, Kosecka J, Fermüller C, Perera I, Ferraro F, Sapp B, Chaudhry R, Singh G.  2011.  Language Models for Semantic Extraction and Filtering in Video Action Recognition. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Groce A, Katz J, Yerukhimovich A.  2011.  Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
Brakerski Z, Katz J, Segev G, Yerukhimovich A.  2011.  Limits on the power of zero-knowledge proofs in cryptographic constructions. Theory of Cryptography. :559-578.
Belhumeur PN, Jacobs DW, Kriegman DJ, Kumar N.  2011.  Localizing parts of faces using a consensus of exemplars. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :545-552.
Belhumeur PN, Jacobs DW, Kriegman DJ, Kumar N.  2011.  Localizing parts of faces using a consensus of exemplars. Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on. :545-552.
Kedilaya S, Plishker W, Purkovic A, Johnson B, Bhattacharyya SS.  2011.  Model-based precision analysis and optimization for digital signal processors. Proceedings of the European Signal Processing Conference. :506-510.
Gove R, Gramsky N, Kirby R, Sefer E, Sopan A, Dunne C, Shneiderman B, Taieb-Maimon M.  2011.  NetVisia: Heat Map & Matrix Visualization of Dynamic Social Network Statistics & Content. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :19-26.
Chekuri C, Gal A, Im S, Khuller S, Li J, McCutchen R, Moseley B, Raschid L.  2011.  New models and algorithms for throughput maximization in broadcast scheduling. Approximation and Online Algorithms. :71-82.
Treangen TJ, Sommer DD, Angly FE, Koren S, Pop M.  2011.  Next Generation Sequence Assembly with AMOS. Current Protocols in Bioinformatics. 11:1-11.
Prasad SK, Chtchelkanova A, Das S, Dehne F, Gouda M, Gupta A, JaJa JF, Kant K, La Salle A, LeBlanc R et al..  2011.  NSF/IEEE-TCPP curriculum initiative on parallel and distributed computing: core topics for undergraduates. Proceedings of the 42nd ACM technical symposium on Computer science education. :617-618.
Kim K, Davis LS.  2011.  Object Detection and Tracking for Intelligent Video Surveillance. Multimedia Analysis, Processing and Communications. :265-288.
Huang Y, Evans D, Katz J.  2011.  Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? 19th Network and Distributed Security Symposium.
Dunne C, Shneiderman B, Gove R, Klavans J, Dorr BJ.  2011.  Rapid understanding of scientific paper collections: integrating statistics, text analysis, and visualization. University of Maryland, Human-Computer Interaction Lab Tech Report HCIL-2011.
Shivashankar V, Jain R, Kuter U, Nau DS.  2011.  Real-Time Planning for Covering an Initially-Unknown Spatial Environment.
Kandel S, Heer J, Plaisant C, Kennedy J, Van Ham F, Riche N H, Weaver C, Lee B, Brodbeck D, Buono P.  2011.  Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.
Kandel S, Heer J, Plaisant C, Kennedy J, Van Ham F, Riche N H, Weaver C, Lee B, Brodbeck D, Buono P.  2011.  Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.

Pages