Publications

Search
Export 891 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Sykes F, Tillman RT, Shneiderman B.  1983.  The effect of scope delimiters on program comprehension. Software: Practice and Experience. 13(9):817-824.
Swamy N, Hicks MW.  2008.  Verified enforcement of automaton-based information release policies. Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security. ACM Press.
Swamy N, Hicks MW, Tse S, Zdancewic S.  2006.  Managing policy updates in security-typed languages. 19th IEEE Computer Security Foundations Workshop, 2006. :13pp.-216-13pp.-216.
Swamy N, Hicks MW, Morrisett G, Grossman D, Jim T.  2006.  Safe manual memory management in Cyclone. Science of Computer Programming. 62(2):122-144.
Swamy N, Guts N, Leijen D, Hicks MW.  2011.  Lightweight monadic programming in ML. Proceedings of the 16th ACM SIGPLAN international conference on Functional programming. :15-27.
Swamy N, Corcoran BJ, Hicks MW.  2008.  Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
Swamy N, Hicks MW.  2009.  Verified enforcement of stateful information release policies. SIGPLAN Not.. 43(12):21-31.
Swamy N, Hicks MW, Tsang S.  2007.  Verified Enforcement of Security Policies for Cross-Domain Information Flows. IEEE Military Communications Conference, 2007. MILCOM 2007. :1-7.
Swamy N, Hicks MW, Bierman GM.  2009.  A theory of typed coercions and its applications. Proceedings of the 14th ACM SIGPLAN international conference on Functional programming. :329-340.
Swaminathan A, He S, Wu M.  2006.  Exploring QIM-based anti-collusion fingerprinting for multimedia. Proceedings of SPIE. 6072:698-709.
Swaminathan A, Mao Y, M. Wu.  2006.  Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on. 1(2):215-230.
Swaminathan A, M. Wu, Liu KJR.  2008.  Digital image forensics via intrinsic fingerprints. Information Forensics and Security, IEEE Transactions on. 3(1):101-117.
Swaminathan A, M. Wu, Liu KJR.  2007.  Nonintrusive component forensics of visual sensors using output images. Information Forensics and Security, IEEE Transactions on. 2(1):91-106.
Swaminathan A, Mao Y, Wu M, Kailas K.  2005.  Data hiding in compiled program binaries for enhancing computer system performance. Information Hiding. :357-371.
Swaminathan A, Wu M, Liu KJR.  2007.  Intrinsic fingerprints for image authentication and steganalysis. Proc. SPIE Conf. Security, Steganography, Watermarking of Multimedia Contents.
Swaminathan A, M. Wu, Liu KJR.  2008.  A pattern classification framework for theoretical analysis of component forensics. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1665-1668.
Swaminathan A, M. Wu, Liu KJR.  2006.  Non-Intrusive Forensic Analysis of Visual Sensors Using Output Images. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
Swaminathan A, M. Wu, Liu KJR.  2006.  Image Tampering Identification using Blind Deconvolution. Image Processing, 2006 IEEE International Conference on. :2309-2312.
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, M. Wu, Oard D.  2010.  System and Method for Confidentiality-Preserving Rank-Ordered Search. 12/608,724
Swaminathan A, M. Wu, Liu KJR.  2007.  A Component Estimation Framework for Information Forensics. Multimedia Signal Processing, 2007. MMSP 2007. IEEE 9th Workshop on. :397-400.
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, M. Wu, Oard D.  2007.  Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
Swaminathan A, Wu M, Liu KJR.  2006.  Component Forensics of Digital Cameras: A Non-Intrusive Approach. Information Sciences and Systems, 2006 40th Annual Conference on. :1194-1199.
Swaminathan A, Mao Y, M. Wu.  2004.  Image hashing resilient to geometric and filtering operations. Multimedia Signal Processing, 2004 IEEE 6th Workshop on. :355-358.
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
Swaminathan A, M. Wu, Liu KJR.  2009.  Component forensics. Signal Processing Magazine, IEEE. 26(2):38-48.

Pages