Publications
Export 1435 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is K [Clear All Filters]
2006. Saliency-guided Enhancement for Volume Visualization. Visualization and Computer Graphics, IEEE Transactions on. 12(5):925-932.
1998. Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
2007. Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
2007. Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007. :311-328.
2001. The role of a natural language conversational interface in online sales: A case study. International Journal of Speech Technology. 4(3):285-295.
2006. Robust fuzzy extractors and authenticated key agreement from close secrets. Advances in Cryptology-CRYPTO 2006. :232-250.
2009. Ring signatures: Stronger definitions, and constructions without random oracles. Journal of Cryptology. 22(1):114-138.
2006. Ring signatures: Stronger definitions, and constructions without random oracles. Theory of Cryptography. :60-79.
2007. Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News. 38(3):20-22.
2006. Review of "Primality Testing in Polynomial Time by Martin Dietzfelbinger", Springer-Verlag, 2004. SIGACT News. 37(1):14-15.
2008. A review of overview+ detail, zooming, and focus+ context interfaces. ACM Computing Surveys (CSUR). 41(1):1-31.
2012. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
2006. Review of "A Computational Introduction to Number Theory and Algebra by Victor Shoup", Cambridge University Press, 2005. SIGACT News. 37(1):12-13.
2009. Revealing biological modules via graph summarization. Journal of Computational Biology. 16(2):253-264.
1993. Restructuring knowledge for an electronic encyclopedia. Sparks of innovation in human-computer interaction. 615:123-123.
2008. Resource allocation for tracking multiple targets using particle filters. The Eighth International Workshop on Visual Surveillance.
2000. Residual coding in document image compression. Image Processing, IEEE Transactions on. 9(6):961-969.
2011. Research Directions in Data Wrangling: Visualizations and Transformations for Usable and Credible Data. Information VisualizationInformation Visualization. 10(4):271-288.