Publications

Search
Export 1434 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Kules B, Shneiderman B.  2005.  Categorized Graphical Overviews for Web Search Results: An Exploratory Study using U.S. Government Agencies as a Meaningful and Stable Structure (2004). Institute for Systems Research Technical Reports.
Kules B, Kustanowitz J, Shneiderman B.  2006.  Categorizing web search results into meaningful and stable categories using fast-feature techniques. Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries. :210-219.
Kules B, Kustanowitz J, Shneiderman B.  2006.  Categorizing web search results into meaningful and stable categories using fast-feature techniques. Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries. :210-219.
Kules B, Shneiderman B.  2005.  Catergorized Overviews for Web Search Results: Two Exploratory Studies in the US Government Domain. Technical Reports from UMIACS.
Han B, Hui P, Kumar AVS, Marathe MV, Pei G, Srinivasan A.  2010.  Cellular traffic offloading through opportunistic communications: a case study. Proceedings of the 5th ACM workshop on Challenged networks. :31-38.
Khuller S, Rosenfeld A, Wu A.  2000.  Centers of sets of pixels. Discrete Applied Mathematics. 103(1–3):297-306.
Talledo M, Rivera ING, Lipp EK, Neale A, Karaolis D, Huq A, Colwell RR.  2003.  Characterization of a Vibrio cholerae phage isolated from the coastal water of Peru. Environmental Microbiology. 5(5):350-354.
Katz J, Yung M.  2006.  Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology. 19(1):67-95.
Kianzad V, Bhattacharyya SS.  2004.  CHARMED: A multi-objective co-synthesis framework for multi-mode embedded systems. Application-Specific Systems, Architectures and Processors, 2004. Proceedings. 15th IEEE International Conference on. :28-40.
Aiken A, Foster JS, Kodumal J, Terauchi T.  2003.  Checking and inferring local non-aliasing. ACM SIGPLAN Notices. 38:129-140.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
Keleher PJ, Spring N, Bhattacharjee B.  2007.  Chit-based access control.
Katz J, Schneier B.  2000.  A chosen ciphertext attack against several e-mail encryption protocols. Ninth USENIX Security Symposium.
Canetti R, Halevi S, Katz J.  2004.  Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. :207-222.
Boneh D, Canetti R, Halevi S, Katz J.  2007.  Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.
Dodis Y, Katz J.  2005.  Chosen-ciphertext security of multiple encryption. Theory of Cryptography. :188-209.
Conroy JM, Kolda TG, O'Leary DP, O'Leary TJ.  2000.  Chromosome Identification Using Hidden Markov Models: Comparison with Neural Networks, Singular Value Decomposition, Principal Components Analysis, and Fisher Discriminant Analysis. Laboratory Investigation. 80(11):1629-1641.
Flach P, Matsubara ET, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  On classification, ranking, and probability estimation.
Alam M, Islam A, Bhuiyan NA, Rahim N, Hossain A, Khan GY, Ahmed D, Watanabe H, Izumiya H, Faruque ASG et al..  2011.  Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1(1)
Kelly W, Pugh W, Rosser E.  1995.  Code generation for multiple mappings. Frontiers of Massively Parallel Computation, 1995. Proceedings. Frontiers '95., Fifth Symposium on the. :332-341.
Beekman I, Kan YC, Priebe S, Martin, M.P.  2010.  Coherent turbulent motions in a Mach 3 boundary layer. Bulletin of the American Physical Society. 55
Mishra P, Varshney A, Kaufman A.  1997.  Collabcad: A toolkit for integrated synchronous and asynchronous sharing of cad applications. Proceedings TeamCAD: GVU/NIST Workshop on Collaborative Design, Atlanta, GA, USA. :131-137.
Nikolova S, Boyd-Graber J, Fellbaum C.  2012.  Collecting Semantic Similarity Ratings to Connect Concepts in Assistive Communication Tools. Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures. 370:81-93.
Namata G M, Kok S, Getoor L.  2011.  Collective graph identification. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. :87-95.

Pages