Export 479 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Doermann D, Rosenfeld A.  1990.  Mailpiece Preprocessing: The population of Character Parts. ATC. :961-972.
Doermann D, Rivlin E, Rosenfeld A.  1998.  The function of documents. Image and Vision Computing. 16(11):799-814.
Doermann D, Karunanidhi A.  2003.  Video Analysis for Pervasive Environments. ICME. 2:161-164.
Doermann D.  1997.  Document Understanding - 1996. LAMP-TR-008,CFAR-TR-853,CS-TR-3775
Doermann D, Varma V, Rosenfeld A.  1992.  Instrument Grasp: AModel and its Effects on Handwritten Strokes. CAR-TR-614
Doermann D, Varma V.  1992.  Simulating Pressure Variations in Handwriting. Proceedings of the Twenty-Third Annual Modeling and Simulation Conference. :2141-2148.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Strong key-insulated signature schemes. Public Key Cryptography—PKC 2003. :130-144.
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M.  2003.  Intrusion-resilient public-key encryption. Topics in Cryptology—CT-RSA 2003. :19-32.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Key-insulated public key cryptosystems. Advances in Cryptology—Eurocrypt 2002. :65-82.
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M.  2004.  A generic construction for intrusion-resilient public-key encryption. Topics in Cryptology–CT-RSA 2004. :1997-1997.
Dodis Y, Katz J, Reyzin L, Smith A.  2006.  Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
Dodis Y, Katz J, Smith A, Walfish S.  2009.  Composability and on-line deniability of authentication. Theory of Cryptography. :146-162.
Dodis Y, Katz J.  2005.  Chosen-ciphertext security of multiple encryption. Theory of Cryptography. :188-209.
Doan K, Plaisant C, Shneiderman B.  1995.  QUERY PREVIEWS IN NETWORKED INFORMATION SYSTEMS. Institute for Systems Research Technical Reports.
Doan K, Plaisant C, Shneiderman B, Bruns T.  1997.  Query previews for networked information systems: a case study with NASA environmental data. SIGMOD Record. 26(1):75-81.
Djikeng A, Raverdy S, Foster JS, Bartholomeu D, Zhang Y, El-Sayed NM, Carlow C.  2007.  Cofactor-independent phosphoglycerate mutase is an essential gene in procyclic form Trypanosoma brucei. Parasitology research. 100(4):887-892.
Dix J, Kraus S, V.S. Subrahmanian.  2002.  Agents dealing with time and uncertainty. Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2. :912-919.
Dix J, Muñoz-Avila H, Nau DS, Zhang L.  2003.  IMPACTing SHOP: Putting an AI Planner Into a Multi-Agent Environment. Annals of Mathematics and Artificial Intelligence. 37(4):381-407.
Dix J, Kuter U, Nau DS.  2002.  HTN Planning in Answer Set Programming. UMIACS-TR-2002-18
Dix J, Munoz-Avila H, Nau DS, Zhang L.  2002.  Theoretical and Empirical Aspects of a Planner in a Multi-agent Environment. Logics in Artificial Intelligence. 2424:173-185.
Dix A, Jones W, Czerwinski M, Teevan J, Plaisant C, Moran TP.  2005.  The Challenge of Personal Information Management. INTERACT'05: Communicating Naturally through Computers (Adjunct Proceedings).
Dix J, Kuter U, Nau DS.  2003.  Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
Dix J, Kraus S, V.S. Subrahmanian.  2001.  Temporal agent programs. Artificial Intelligence. 127(1):87-135.
Dix J, Muñoz-Avila H, Nau DS, Zhang L.  2002.  Planning in a multi-agent environment: theory and practice. :944-945.
Dingermann T, Sharp S, Appel B, DeFranco D, Mount SM, Heiermann R, Pongs O, Söll D.  1981.  Transcription of cloned tRNA and 5S RNA genes in a Drosophila cell free extract. Nucleic Acids ResearchNucl. Acids Res.. 9(16):3907-3918.