Publications

Export 292 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is F  [Clear All Filters]
Journal Articles
Khuller S, Naor J.  1994.  Flow in planar graphs with vertex capacities. Algorithmica. 11(3):200-225.
Nassi I, Shneiderman B.  1973.  Flowchart techniques for structured programming. ACM SIGPLAN Notices. 8(8):12-26.
Foster JS, Johnson R, Kodumal J, Aiken A.  2006.  Flow-insensitive type qualifiers. ACM Transactions on Programming Languages and Systems (TOPLAS). 28(6):1035-1087.
Foster JS, Terauchi T, Aiken A.  2002.  Flow-sensitive type qualifiers. ACM SIGPLAN Notices. 37(5):1-12.
Zhao HV, M. Wu, Wang ZJ, Liu KJR.  2005.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Image Processing, IEEE Transactions on. 14(5):646-661.
Lu W, Varna AL, Wu M.  2010.  Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.
Tse C, Krafft C, Mayergoyz ID, McAvoy P, Tseng C-Y.  2005.  Forensic recovery of hard disk data by using the spin-stand imaging technique. Proceedings of SPIE. 5778(1):595-606.
Grant J, Kraus S, Perlis D.  2005.  Formal approaches to teamwork. We Will Show Them: Essays in Honour of Dov Gabbay. 1:39-68.
Reggia JA, Nau DS, Wang P, Peng Y.  1985.  A formal model of abductive inference. Information Sciences. 37:227-285.
Reggia JA, Nau DS, Wang PY, Peng Y.  1985.  A formal model of diagnostic inference, II. Algorithmic solution and application. Information Sciences. 37(1-3):257-285.
Ray A, Cleaveland R.  2004.  Formal Modeling Of Middleware-based Distributed Systems. Electronic Notes in Theoretical Computer Science. 108:21-37.
Tian J, Zelkowitz MV.  1992.  A formal program complexity model and its application. Journal of Systems and Software. 17(3):253-266.
Ramasamy HV, Cukier M, Sanders WH.  2003.  Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
Bierman G, Hicks MW, Sewell P, Stoyle G.  2003.  Formalizing dynamic software updating. Proceedings of the Second International Workshop on Unanticipated Software Evolution (USE).
Canetti R, Halevi S, Katz J.  2007.  A forward-secure public-key encryption scheme. Journal of Cryptology. 20(3):265-294.
Canetti R, Halevi S, Katz J.  2003.  A forward-secure public-key encryption scheme. Advances in Cryptology—Eurocrypt 2003. :646-646.
Shaman J., Solomon S., Colwell RR, Field C.B.  2013.  Fostering advances in interdisciplinary climate science. Proceedings of the National Academy of Sciences. (Supplement_114869243Supplement_1):3653-3656.
Stewart G.W.  1999.  Four algorithms for the efficient computation of truncated pivoted QR approximations to a sparse matrix. Numerische Mathematik. 83(2):313-323.
Chan TF, Elman H.  1989.  Fourier Analysis of Iterative Methods for Elliptic Problems. SIAM Review. 31(1):20-49.
Elman H, Ramage A.  2006.  Fourier analysis of multigrid for a model two-dimensional convection-diffusion equation. BIT Numerical Mathematics. 46(2):283-306.
Jacobs DW, Rokers B, Rudra A, Liu Z.  2001.  Fragment completion in humans and machines. NIPS. :27-34.
Methé BA, Nelson KE, Pop M, Creasy HH, Giglio MG, Huttenhower C, Gevers D, Petrosino JF, Abubucker S, Badger JH.  2012.  A framework for human microbiome research. Nature. 486:215-221.
Shneiderman B.  1997.  A framework for search interfaces. IEEE Software. 14(2):18-20.
Corrada Bravo H, Page D, Ramakrishnan R, Shavlik J, Costa VS.  2005.  A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
Varna AL, Chuang WH, Wu M.  2010.  A framework for theoretical analysis of content fingerprinting. Proc. of SPIE Media Forensics and Security.

Pages