Publications

Search
Export 1830 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
Book Chapters
Papamanthou C, Tollis IG, Doerr M.  2005.  3D Visualization of Semantic Metadata Models and Ontologies. Graph Drawing. :377-388.
Xu Q, desJardins M, Wagstaff K.  2005.  Active Constrained Clustering by Examining Spectral Eigenvectors. Discovery ScienceDiscovery Science. 3735:294-307.
Dachman-Soled D, Malkin T, Raykova M, Venkitasubramaniam M.  2013.  Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments. Advances in Cryptology - ASIACRYPT 2013. :316-336.
Li R, Chellappa R.  2010.  Aligning Spatio-Temporal Signals on a Special Manifold. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6315:547-560.
Dumitras T, Srivastava D, Narasimhan P.  2005.  Architecting and Implementing Versatile Dependability. Architecting Dependable Systems III. :212-231.
Dumitras T, Srivastava D, Narasimhan P.  2005.  Architecting and Implementing Versatile Dependability. Architecting Dependable Systems III. :212-231.
Gopalan R, Turaga P, Chellappa R.  2010.  Articulation-Invariant Representation of Non-planar Shapes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6313:286-299.
Svec P, Gupta SK.  2011.  Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries. New Horizons in Evolutionary Robotics. 341:171-193.
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2008.  Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
Dorr BJ, Levow G-A, Lin D.  2000.  Building a Chinese-English Mapping Between Verb Concepts for Multilingual Applications. Envisioning Machine Translation in the Information FutureEnvisioning Machine Translation in the Information Future. 1934:345-363.
Dachman-Soled D, Mahmoody M, Malkin T.  2014.  Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? Theory of Cryptography. :217-239.
Dachman-Soled D, Servedio RA.  2011.  A Canonical Form for Testing Boolean Function Properties. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :460-471.
Choi SGeol, Dachman-Soled D, Yung M.  2012.  On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
Choi SGeol, Dachman-Soled D, Yung M.  2012.  On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
Blake-Hall J, Walker O, Fushman D.  2004.  Characterization of the Overall Rotational Diffusion of a Protein From 15N Relaxation Measurements and Hydrodynamic Calculations. Protein NMR Techniques. 278:139-159.
Dunlavy DM, Conroy JM, O'Leary TJ, O'Leary DP.  2003.  Clustering and Summarizing Medline Abstracts. BISTI 2003 Symposium on Digital Biology: The Emerging ParadigmBISTI 2003 Symposium on Digital Biology: The Emerging Paradigm.
Hannenhalli S, Hubbell E, Lipshutz R, Pevzner P.  2002.  Combinatorial Algorithms for Design of DNA Arrays. Chip TechnologyChip Technology. 77:1-19.
Hannenhalli S, Hubbell E, Lipshutz R, Pevzner P.  2002.  Combinatorial Algorithms for Design of DNA Arrays. Chip TechnologyChip Technology. 77:1-19.
Hannenhalli S, Hubbell E, Lipshutz R, Pevzner P.  2002.  Combinatorial Algorithms for Design of DNA Arrays. Chip TechnologyChip Technology. 77:1-19.
Jaeger S, Ma H, Doermann D.  2008.  Combining Classifiers with Informational Confidence. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :163-192.
Sankaranarayanan A, Turaga P, Baraniuk R, Chellappa R.  2010.  Compressive Acquisition of Dynamic Scenes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6311:129-142.
Dachman-Soled D, Gennaro R, Krawczyk H, Malkin T.  2012.  Computational Extractors and Pseudorandomness. Theory of Cryptography. :383-403.
Dorr BJ.  1991.  Conceptual Basis of the Lexicon in Machine Translation. Lexical acquisition: exploiting on-line resources to build a lexiconLexical acquisition: exploiting on-line resources to build a lexicon. :263-263.
Evans P, Donahue G, Hannenhalli S.  2006.  Conservation Patterns in cis-Elements Reveal Compensatory Mutations. Comparative GenomicsComparative Genomics. 4205:186-199.

Pages