Publications

Export 292 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Title is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Kim K, Davis LS.  2004.  A fine-structure image/video quality measure using local statistics. Image Processing, 2004. ICIP '04. 2004 International Conference on. 5:3535-3538Vol.5-3535-3538Vol.5.
Khuller S, Martinez V, Nau DS, Simari G, Sliva A, Subrahmanian V.  2007.  Finding most probable worlds of probabilistic logic programs. Scalable Uncertainty Management. :45-59.
Khuller S, Pless R, Sussmann YJ.  2000.  Fault tolerant K-center problems. Theoretical Computer Science. 242(1–2):237-245.
Khuller S, Sussmann YJ, Bhatia R, Guha S.  1998.  Facility Location with Dynamic Distance Functions. Journal of Combinatorial Optimization. 2(3):199-217.
Khuller S, Martinez V, Nau DS, Simari G, Sliva A, Subrahmanian V.  2007.  Finding Most Probable Worlds of Probabilistic Logic Programs. Scalable Uncertainty Management. 4772:45-59.
Khuller S, Naor J.  1994.  Flow in planar graphs with vertex capacities. Algorithmica. 11(3):200-225.
Kee H, Bhattacharyya SS, Wong I, Rao Y.  2010.  FPGA-based design and implementation of the 3GPP-LTE physical layer using parameterized synchronous dataflow techniques. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1510-1513.
Katz J, Ostrovsky R, Yung M.  2003.  Forward secrecy in password-only key exchange protocols. Proceedings of the 3rd international conference on Security in communication networks. :29-44.
Katz J.  2002.  A forward-secure public-key encryption scheme.
Kale A, Roy Chowdhury AK, Chellappa R.  2004.  Fusion of gait and face for human identification. Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. 5:V-901-4vol.5-V-901-4vol.5.
J
Jordan PW, Dorr BJ, Benoit JW.  1993.  A first-pass approach for evaluating machine translation systems. Machine Translation. 8(1):49-58.
Jajodia S, Samarati P, Sapino M L, V.S. Subrahmanian.  2001.  Flexible support for multiple access control policies. ACM Trans. Database Syst.. 26(2):214-260.
Jacobs DW, Rokers B, Rudra A, Liu Z.  2001.  Fragment completion in humans and machines. NIPS. :27-34.
Jacobs DW, Chennubhotla C.  1994.  Finding structurally consistent motion correspondences. Pattern Recognition, 1994. Vol. 1 - Conference A: Computer Vision Image Processing., Proceedings of the 12th IAPR International Conference on. 1:650-653vol.1-650-653vol.1.
I
Islamaj R, Getoor L, Wilbur W.  2006.  A feature generation algorithm for sequences with application to splice-site prediction. Knowledge Discovery in Databases: PKDD 2006. :553-560.
H
Hutchinson H, Bederson BB, Plaisant C, Druin A.  2003.  Family Calendar Survey. Technical Reports from UMIACS.
Huang Y, Evans D, Katz J, Malka L.  2011.  Faster secure two-party computation using garbled circuits. USENIX Security Symposium.
Hovemeyer D, Pugh W.  2004.  Finding bugs is easy. ACM SIGPLAN NoticesSIGPLAN Not.. 39(12):92-92.
Hovemeyer D, Pugh W.  2004.  Finding concurrency bugs in java. Proceedings of the PODC Workshop on Concurrency and Synchronization in Java Programs, St. John's, Newfoundland, Canada.
Hochheiser H, Shneiderman B.  2010.  From bowling alone to tweeting together: technology-mediated social participation. Interactions. 17(2):64-67.
Hara K, Le V, Froehlich J.  2012.  A feasibility study of crowdsourcing and google street view to determine sidewalk accessibility. :273-274.
Hale K, Keyser SJ, Hutchins WJ, Habash N, Dorr BJ, Traum D.  2005.  Finite-State Language resources and Language Processing. Machine Translation. 18:381-382.
Haibin G A, Agarwal G, Ling H, Jacobs DW, Shirdhonkar S, Kress JW, Russell R, Belhumeur P, Dixit A, Feiner S et al..  2006.  First Steps Toward an Electronic Field Guide for Plants. Taxon. 55:597-610.

Pages