Publications

Export 480 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Hua KA, Hannenhalli S.  1991.  Parallel transitive closure computations using topological sort. , Proceedings of the First International Conference on Parallel and Distributed Information Systems, 1991. :122-129.
Hua S, Qu G, Bhattacharyya SS.  2007.  Probabilistic design of multimedia embedded systems. ACM Transactions on Embedded Computing Systems (TECS). 6(3):15–es-15–es.
Huang Y, Evans D, Katz J.  2011.  Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? 19th Network and Distributed Security Symposium.
Huang C-M, O'Leary DP.  1992.  Preconditioning parallel multisplittings for solving linear systems of equations. Proceedings of the 6th international conference on Supercomputing. :478-484.
Huang Y, Feamster N, Teixeira R.  2008.  Practical issues with using network tomography for fault diagnosis. SIGCOMM Comput. Commun. Rev.. 38(5):53-58.
Hung E, Getoor L, V.S. Subrahmanian.  2007.  Probabilistic interval XML. ACM Transactions on Computational Logic (TOCL). 8(4)
Hung E, Getoor L, V.S. Subrahmanian.  2003.  PXML: a probabilistic semistructured data model and algebra. Data Engineering, 2003. Proceedings. 19th International Conference on. :467-478.
Hussein M, Porikli F, Davis LS.  2009.  PERCEPTION AND NAVIGATION FOR AUTONOMOUS VEHICLES. IEEE Transactions on intelligent transportation systems. 10(3):417-427.
Hwang E, Prabhakaran B, V.S. Subrahmanian.  2002.  Presentation planning for distributed VoD systems. Knowledge and Data Engineering, IEEE Transactions on. 14(5):1059-1077.
I
Islam MS, Tasmin R, s l a m Khan SI, Bakht HBM, a y a t Mahmood ZH, i a u r Rahman MZ, m i n Bhuiyan NA, Nishibuchi M, a l a k r i s h Nair GB, r a d l e y Sack RB et al..  2004.  Pandemic strains of O3:K6 Vibrio parahaemolyticus in the aquatic environment of Bangladesh. Canadian Journal of Microbiology. 50(10):827-834.
Itoi N, Arbaugh WA, Pollack S, Reeves D.  2001.  Personal secure booting. Information Security and Privacy. :130-144.
J
Jacobs DW.  2001.  Perceptual organization as generic object recognition. From Fragments to Objects Segmentation and Grouping in VisionFrom Fragments to Objects Segmentation and Grouping in Vision. Volume 130:295-329.
Jacobs DW.  2003.  Perceptual Completion and Memory. Perceptual organization in vision: behavioral and neural perspectivesPerceptual organization in vision: behavioral and neural perspectives. :403-403.
JaJa JF.  2000.  A perspective on Quicksort. Computing in Science Engineering. 2(1):43-49.
JaJa JF, Shi Q, Varshney A.  2008.  Parallel Algorithms for Volumetric Surface Construction.
JaJa JF.  1991.  Parallel algorithms for VLSI routing. Integration, the VLSI Journal. 12(3):305-320.
JaJa JF, Kosaraju SR.  1988.  Parallel algorithms for planar graph isomorphism and related problems. Circuits and Systems, IEEE Transactions on. 35(3):304-311.
JaJa JF, Chang S-C.  1991.  Parallel Algorithms for Channel Routing in the Knock-Knee Model. SIAM Journal on Computing. 20(2):228-245.
Jajodia S, Kudo M, V.S. Subrahmanian.  2001.  Provisional authorizations. E-commerce Security and Privacy. 2:133-159.
Juba D, Varshney A.  2008.  Parallel, stochastic measurement of molecular surface area. Journal of Molecular Graphics and Modelling. 27(1):82-87.
Juba D, Cardone A, Ip C Y, Simon Jr CG, K Tison C, Kumar G, Brady M, Varshney A.  2013.  Parallel geometric classification of stem cells by their three-dimensional morphology. Computational Science & Discovery. 6(1):015007.
K
Kamara S, Papamanthou C.  2013.  Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography and Data Security. :258-274.
Kanal LN, Agrawala AK.  1973.  Pattern Recognition.
Kang H-J, Doermann D.  2004.  Product approximation by minimizing the upper bound of Bayes error rate for Bayesian combination of classifiers. Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on. 1:252-255Vol.1-252-255Vol.1.
Katz J.  2010.  Public-Key Cryptography. Handbook of Information and Communication Security. :21-34.

Pages