Publications
Export 1435 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is K [Clear All Filters]
2010. Efficient rational secret sharing in standard communication networks. Theory of Cryptography. :419-436.
2010. Efficient static buffering to guarantee throughput-optimal FPGA implementation of synchronous dataflow graphs. 2010 International Conference on Embedded Computer Systems (SAMOS). :136-143.
2010. Efficient static buffering to guarantee throughput-optimal FPGA implementation of synchronous dataflow graphs. 2010 International Conference on Embedded Computer Systems (SAMOS). :136-143.
2010. Electromagnetic Modeling of Ethernet Transformers. Magnetics, IEEE Transactions on. 46(2):563-569.
2010. Energy efficient scheduling via partial shutdown. Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms. :1360-1372.
2010. Energy-driven distribution of signal processing applications across wireless sensor networks. ACM Trans. Sen. Netw.. 6(3):24:1-24:32.
2010. Evolutionary framework for Lepidoptera model systems. Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera. :1-24.
2010. Exploring Biological Network Dynamics with Ensembles of Graph Partitions. Proceedings of the PSB Pacific Symposium on Biocomputing. 15:166-177.
2010. Finding Biologically Accurate Clusterings in Hierarchical Tree Decompositions Using the Variation of Information. Journal of Computational Biology. 17(3):503-516.
2010. FPGA-based design and implementation of the 3GPP-LTE physical layer using parameterized synchronous dataflow techniques. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1510-1513.
2010. GasSense: Appliance-Level, Single-Point Sensing of Gas Activity in the Home. Pervasive Computing. 6030:265-282.
2010. General-purpose vs. gpu: Comparison of many-cores on irregular workloads. Proceedings of the Second Usenix Workshop on Hot Topics in Parallelism. :14-15.
2010. A graph-theoretic approach to protect static and moving targets from adversaries. Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1. :299-306.
2010. A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. :395-412.
2010. Handwritten Arabic text line segmentation using affinity propagation. Proceedings of the 9th IAPR International Workshop on Document Analysis Systems. :135-142.
2010. Handwritten Arabic text line segmentation using affinity propagation. Proceedings of the 9th IAPR International Workshop on Document Analysis Systems. :135-142.
2010. Hopx and Hdac2 Interact to Modulate Gata4 Acetylation and Embryonic Cardiac Myocyte Proliferation. Developmental Cell. 19(3):450-459.
2010. Identification of Pathogenic Vibrio Species by Multilocus PCR-Electrospray Ionization Mass Spectrometry and Its Application to Aquatic Environments of the Former Soviet Republic of Georgia. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 76(6):1996-2001.
2010. Improving translation via targeted paraphrasing. Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing. :127-137.
2010. Insights into head-related transfer function: Spatial dimensionality and continuous representation. The Journal of the Acoustical Society of America. 127(4):2347-2357.
2010. iOpener Workbench: Tools for rapid understanding of scientific literature. Human-Computer Interaction Lab 27th Annual Symposium, University of Maryland, College Park, MD.
2010. On k-Column Sparse Packing Programs. Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization. 6080:369-382.
2010. Lineage processing over correlated probabilistic databases. Proceedings of the 2010 international conference on Management of data. :675-686.