Publications

Export 1435 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Journal Articles
Kim Y, Varshney A.  2006.  Saliency-guided Enhancement for Volume Visualization. Visualization and Computer Graphics, IEEE Transactions on. 12(5):925-932.
Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Banerjee S, Agarwal S, Kamel K, Kochut A, Kommareddy C, Nadeem T, Thakkar P, Trinh B, Youssef A, Youssef M et al..  2002.  Rover: scalable location-aware computing. Computer. 35(10):46-53.
Froehlich J, Krumm J.  2008.  Route prediction from trip observations. SAE SP. 2193
Katz J, Ostrovsky R.  2004.  Round-optimal secure two-party computation. Advances in Cryptology–CRYPTO 2004. :3-34.
Katz J, Vaikuntanathan V.  2011.  Round-optimal password-based authenticated key exchange. Theory of Cryptography. :293-310.
Katz J, Koo CY.  2007.  Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
Katz J, Koo CY.  2007.  Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
Chai J, Jimmy Lin, Zadrozny W, Ye Y, Stys-Budzikowska M, Horvath V, Kambhatla N, Wolf C.  2001.  The role of a natural language conversational interface in online sales: A case study. International Journal of Speech Technology. 4(3):285-295.
Dodis Y, Katz J, Reyzin L, Smith A.  2006.  Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
Bender A, Katz J, Morselli R.  2009.  Ring signatures: Stronger definitions, and constructions without random oracles. Journal of Cryptology. 22(1):114-138.
Bender A, Katz J, Morselli R.  2006.  Ring signatures: Stronger definitions, and constructions without random oracles. Theory of Cryptography. :60-79.
Katz J.  2007.  Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News. 38(3):20-22.
Katz J.  2006.  Review of "Primality Testing in Polynomial Time by Martin Dietzfelbinger", Springer-Verlag, 2004. SIGACT News. 37(1):14-15.
Cockburn A, Karlson A, Bederson BB.  2008.  A review of overview+ detail, zooming, and focus+ context interfaces. ACM Computing Surveys (CSUR). 41(1):1-31.
Katz J.  2012.  Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
Royer EM, Toh CK, Hicks MW, Kakkar P, Moore JT, Hicks MW, Moore JT, Alexander DS, Gunter CA, Nettles S et al..  2000.  A Review of Current Routing Protocols for Ad Hoc. IEEE Personal Communications. 29:156-71.
Katz J.  2006.  Review of "A Computational Introduction to Number Theory and Algebra by Victor Shoup", Cambridge University Press, 2005. SIGACT News. 37(1):12-13.
Navlakha S, Schatz MC, Kingsford C.  2009.  Revealing biological modules via graph summarization. Journal of Computational Biology. 16(2):253-264.
Kreitzberg CB, Shneiderman B.  1993.  Restructuring knowledge for an electronic encyclopedia. Sparks of innovation in human-computer interaction. 615:123-123.
Kembhavi A, Schwartz WR, Davis LS, others.  2008.  Resource allocation for tracking multiple targets using particle filters. The Eighth International Workshop on Visual Surveillance.
Kia OE, Doermann D.  2000.  Residual coding in document image compression. Image Processing, IEEE Transactions on. 9(6):961-969.
Kandel S, Heer J, Plaisant C, Kennedy J, Van Ham F, Riche N H, Weaver C, Lee B, Brodbeck D, Buono P.  2011.  Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.

Pages