Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Book Chapters
Papamanthou C, Tamassia R, Triandopoulos N.  2010.  Optimal Authenticated Data Structures with Multilinear Forms. Pairing-Based Cryptography - Pairing 2010. :246-264.
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H.  2008.  Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
Papamanthou C, Tamassia R, Triandopoulos N.  2011.  Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
Kamara S, Papamanthou C.  2013.  Parallel and Dynamic Searchable Symmetric Encryption. Financial Cryptography and Data Security. :258-274.
Sahinalp S, Vishkin U.  1994.  On a parallel-algorithms method for string matching problems (overview). Algorithms and ComplexityAlgorithms and Complexity. 778:22-32.
Papamanthou C, Tollis IG.  2007.  Parameterized st-Orientations of Graphs: Algorithms and Experiments. Graph Drawing. :220-233.
Reggia JA, D'Autrechy CL.  1990.  Parsimonious covering theory in cognitive diagnosis and adaptive instruction. Diagnostic Monitoring of Skill and Knowledge AcquisitionDiagnostic Monitoring of Skill and Knowledge Acquisition. :510-510.
Chellappa R, Veeraraghavan A, Aggarwal G.  2005.  Pattern Recognition in Video. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. 3776:11-20.
Marchionini G, Plaisant C, Komlodi A.  2003.  The people in digital libraries: Multifaceted approaches to assessing needs and impact. Digital library use: Social practice in design and evaluationDigital library use: Social practice in design and evaluation. :119-160.
Jacobs DW.  2003.  Perceptual Completion and Memory. Perceptual organization in vision: behavioral and neural perspectivesPerceptual organization in vision: behavioral and neural perspectives. :403-403.
Jacobs DW.  2001.  Perceptual organization as generic object recognition. From Fragments to Objects Segmentation and Grouping in VisionFrom Fragments to Objects Segmentation and Grouping in Vision. Volume 130:295-329.
Dunlavy DM, Conroy JM, Schlesinger JD, Goodman SA, Okurowski M E, O'Leary DP, van Halteren H.  2003.  Performance of a Three-Stage System for Multi-Document Summarization. DUC 03 Conference ProceedingsDUC 03 Conference Proceedings.
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V.  2004.  Plan Databases: Model and Algebra. Foundations of Information and Knowledge Systems. 2942:302-319.
Au T-C, Kuter U, Nau DS.  2009.  Planning for Interactions among Autonomous Agents. Programming Multi-Agent Systems. 5442:1-23.
Dix J, Kuter U, Nau DS.  2003.  Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
Neumann J, Fermüller C, Aloimonos Y.  2002.  Polydioptric Cameras: New Eyes for Structure from Motion. Pattern RecognitionPattern Recognition. 2449:618-625.
Hannenhalli S.  1995.  Polynomial-time algorithm for computing translocation distance between genomes. Combinatorial Pattern MatchingCombinatorial Pattern Matching. 937:162-176.
Yue Z, Zhao W, Chellappa R.  2005.  Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
Vishkin U.  2004.  PRAM-On-Chip: A Quest for Not-So-Obvious Non-obviousness. Mathematical Foundations of Computer Science 2004Mathematical Foundations of Computer Science 2004. 3153:104-105.
Deshpande A.  2009.  PrDB: Managing Large-Scale Correlated Probabilistic Databases (Abstract). Scalable Uncertainty ManagementScalable Uncertainty Management. 5785:1-1.
Monahemi M, Barlow J, O'Leary DP.  1992.  On the Precise Loop Transfer Recovery and Transmission Zeroes. First IEEE Conference on Control ApplicationsFirst IEEE Conference on Control Applications.
Shen E, Elaine Shi, Waters B.  2009.  Predicate Privacy in Encryption Systems. Theory of Cryptography. 5444:457-473.
Wang L, Deshpande A.  2008.  Predictive Modeling-Based Data Collection in Wireless Sensor Networks. Wireless Sensor NetworksWireless Sensor Networks. 4913:34-51.
Hombsek K, Bederson BB, Plaisant C.  2003.  Preserving Context with Zoomable User Interfaces. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :83-83.

Pages