Publications

Export 1435 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2011
Katz J, Vaikuntanathan V.  2011.  Round-optimal password-based authenticated key exchange. Theory of Cryptography. :293-310.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Kumar J, Kang L, Doermann D, Abd-Almageed W.  2011.  Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
Kumar J, Kang L, Doermann D, Abd-Almageed W.  2011.  Segmentation of Handwritten Textlines in Presence of Touching Components. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :109-113.
Kanagal B, Li J, Deshpande A.  2011.  Sensitivity analysis and explanations for robust query evaluation in probabilistic databases. Proceedings of the 2011 international conference on Management of data. :841-852.
Kumar J, Prasad R, Cao H, Abd-Almageed W, Doermann D, Natarajan P.  2011.  Shape Codebook based Handwritten and Machine Printed Text Zone Extraction. Document Recognition and Retrieval. :7874:1-8-7874:1-8.
Sharma P, Khurana U, Shneiderman B, Scharrenbroich M, Locke J.  2011.  Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
Kimes NE, Grim CJ, Johnson WR, Hasan NA, Tall BD, Kothary MH, Kiss H, Munk CA, Tapia R, Green L et al..  2011.  Temperature regulation of virulence factors in the pathogen Vibrio coralliilyticus. The ISME Journal. 6(4):835-846.
Kimes NE, Grim CJ, Johnson WR, Hasan NA, Tall BD, Kothary MH, Kiss H, Munk CA, Tapia R, Green L et al..  2011.  Temperature regulation of virulence factors in the pathogen Vibrio coralliilyticus. The ISME Journal. 6(4):835-846.
Kimes NE, Grim CJ, Johnson WR, Hasan NA, Tall BD, Kothary MH, Kiss H, Munk CA, Tapia R, Green L et al..  2011.  Temperature regulation of virulence factors in the pathogen Vibrio coralliilyticus. The ISME Journal. 6(4):835-846.
Kang L, Doermann D.  2011.  Template based Segmentation of Touching Components in Handwritten Text Lines. 11th Intl. Conf. on Document Analysis and Recognition (ICDAR'11). :569-573.
Keceli F, Tzannes A, Caragea GC, Barua R, Vishkin U.  2011.  Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1282-1291.
Sane N, Kee H, Seetharaman G, Bhattacharyya SS.  2011.  Topological Patterns for Scalable Representation and Analysis of Dataflow Graphs. Journal of Signal Processing Systems. 65(2):229-244.
Kim Y-S, Dagalakis NG, Gupta SK.  2011.  A Two Degree of Freedom Nanopositioner With Electrothermal Actuator for Decoupled Motion. :447-457.
Gove R, Dunne C, Shneiderman B, Klavans J, Dorr BJ.  2011.  Understanding Scientific Literature Networks: An Evaluation of Action Science Explorer.
Katz J, Maurer U, Tackmann B, Zikas V.  2011.  Universally composable synchronous computation.
Zaki GF, Plishker W, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Vectorization and mapping of software defined radio applications on heterogeneous multi-processor platforms. 2011 IEEE Workshop on Signal Processing Systems (SiPS). :31-36.
Kembhavi A, Harwood D, Davis LS.  2011.  Vehicle Detection Using Partial Least Squares. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 33(6):1250-1265.
Khurana U, Nguyen V-A, Cheng H-C, Ahn J-wook, Chen X, Shneiderman B.  2011.  Visual Analysis of Temporal Trends in Social Networks Using Edge Color Coding and Metric Timelines. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :549-554.
Konte M, Feamster N.  2011.  Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
2010
Aggarwal G, Panigrahy R, Feder T, Thomas D, Kenthapadi K, Khuller S, Zhu A.  2010.  Achieving anonymity via clustering. ACM Trans. Algorithms. 6(3):49:1–49:19-49:1–49:19.
Aggarwal G, Panigrahy R, Feder T, Thomas D, Kenthapadi K, Khuller S, Zhu A.  2010.  Achieving anonymity via clustering. ACM Trans. Algorithms. 6(3):49:1–49:19-49:1–49:19.
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.

Pages