Publications
Export 1435 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is K [Clear All Filters]
2014. Stable isotope labeling of phosphoproteins for large-scale phosphorylation rate determination. Molecular & Cellular Proteomics.
2018. Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
2018. Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
2018. Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
2018. Spores and soil from six sides: interdisciplinarity and the environmental biology of anthrax (Bacillus anthracis). Biological Reviews. (4):1813-1831.
1993. Speech versus mouse commands for word processing: an empirical evaluation. International Journal of Man-Machine Studies. 39(4):667-687.
1999. Specifying the PLAN Network Programming Langauge. Electronic Notes in Theoretical Computer Science. 26:87-104.
2010. Special Section on Distributed Camera Networks: Sensing, Processing, Communication, and Implementation. Image Processing, IEEE Transactions on. 19(10):2513-2515.
2004. Special issue: 35th Annual ACM Symposium on Theory of Computing. Journal of Computer and System Sciences. 69(3):305-305.
1999. Solution Structure of the Proapoptotic Molecule BID: A Structural Basis for Apoptotic Agonists and Antagonists. Cell. 96(5):625-634.
2009. Smooth projective hashing and password-based authenticated key exchange from lattices. Advances in Cryptology–ASIACRYPT 2009. :636-652.
1994. Slipped-strand mispairing in a plastid gene: ıt rpoC2 in grasses (Poaceae). Mol Biol Evol. 11(1):1-8.
1994. Slipped-strand mispairing in a plastid gene: ıt rpoC2 in grasses (Poaceae). Mol Biol Evol. 11(1):1-8.
1994. Simulation of the transient characteristics of partially- and fully-depleted SOI MOSFETs. Solid-State Electronics. 37(7):1387-1394.
1996. Simulation of the logic switching characteristics of hot-carrier-degraded ultra-thin SOI CMOS inverters. Solid-State Electronics. 39(11):1669-1674.
2005. Simulation and Secure Computation-Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. Lecture Notes in Computer Science. 3378:128-149.
2005. A simulation and data analysis system for large-scale, data-driven oil reservoir simulation studies. Concurrency and Computation: Practice and Experience. 17(11):1441-1467.
1995. A simple randomized sieve algorithm for the closest-pair problem. Information and Computation. 118(1):34-37.
2009. Signing a linear subspace: Signature schemes for network coding. Public Key Cryptography–PKC 2009. :68-87.
2009. Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009. :703-720.