Export 116 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is I  [Clear All Filters]
Book Chapters
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
Wang L-S, Jensen S, Hannenhalli S.  2006.  An Interaction-Dependent Model for Transcription Factor Binding. Systems Biology and Regulatory GenomicsSystems Biology and Regulatory Genomics. 4023:225-234.
Iwerks GS, Samet H, Smith KP.  2004.  Maintenance of Spatial Semijoin Queries on Moving Points. Proceedings 2004 VLDB ConferenceProceedings 2004 VLDB Conference. :828-839.
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H.  2008.  Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
Pemmaraju S, Srinivasan A.  2008.  The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
Anagnostakis K, Hicks MW, Ioannidis S, Keromytis A, Smith J.  2000.  Scalable Resource Control in Active Networks. Active NetworksActive Networks. 1942:343-357.
Zelkowitz MV, Kowalchack B, Itkin D, Herman L.  1989.  A support tool for teaching computer programming. Issues in software engineering educationIssues in software engineering education. :139-167.
Dix J, Munoz-Avila H, Nau DS, Zhang L.  2002.  Theoretical and Empirical Aspects of a Planner in a Multi-agent Environment. Logics in Artificial Intelligence. 2424:173-185.
Papamanthou C, Tamassia R.  2007.  Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Information and Communications Security. :1-15.
Nguyen H V, Banerjee A, Burlina P, Broadwater J, Chellappa R.  2011.  Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.
Caprara A, Italiano G, Mohan G, Panconesi A, Srinivasan A.  2000.  Wavelength Rerouting in Optical Networks, or the Venetian Routing Problem. Approximation Algorithms for Combinatorial Optimization. 1913:71-84.
Conference Papers
Deshpande A, Ives Z, Raman V.  2007.  Adaptive query processing: why, how, when, what next? Proceedings of the 33rd international conference on Very large data bases. :1426-1427.
Parker A, Infantes G, V.S. Subrahmanian, Grant J.  2008.  An AGM-based belief revision mechanism for probabilistic spatio-temporal logics. Proceedings of the 23rd national conference on Artificial intelligence. :511-516.
Ilghami O, Nau DS, Munoz-Avila H, Aha DW.  2002.  CaMeL: Learning method preconditions for HTN planning. :131-14.
Iwerks GS, Samet H, Smith K.  2003.  Continuous k-nearest neighbor queries for continuously moving points with updates. Proceedings of the 29th international conference on Very large data bases-Volume 29. :512-523.
Catarci T, Costabile MF, Cruz IF, Ioannidis Y, Shneiderman B.  1997.  Data models, visual representations, metaphors: how to solve the puzzle? (panel) Proceedings of the third IFIP WG2.6 working conference on Visual database systems 3 (VDB-3). :177-182.
Benford S, Bederson BB, \AAkesson KP, Bayon V, Druin A, Hansson P, Hourcade JP, Ingram R, Neale H, O'Malley C et al..  2000.  Designing storytelling technologies to encouraging collaboration between young children. Proceedings of the SIGCHI conference on Human factors in computing systems. :556-563.
Ito E, Aloimonos Y.  1987.  Determining three dimensional transformation parameters from images: Theory. 1987 IEEE International Conference on Robotics and Automation. Proceedings. 4:57-61.
Zelkowitz MV, Elgot J, Itkin D, Kowalchack B, Maggio M.  1985.  The Engineering of an Environment on Small Machines. Proceedings of the IEEE 1st International Conference on Computer Workstations. :61-69.
Ibrahim A, Katz B, Jimmy Lin.  2003.  Extracting structural paraphrases from aligned monolingual corpora. Proceedings of the second international workshop on Paraphrasing - Volume 16. :57-64.
Varadarajan R, Hristidis V, Raschid L, Vidal ME, Ibá\ nez L, Rodríguez-Drumond H.  2009.  Flexible and efficient querying and ranking on hyperlinked data sources. Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. :553-564.
Doermann D, Intrator N, Rivin E, Steinherz T.  2002.  Hidden loop recovery for handwriting recognition. Frontiers in Handwriting Recognition, 2002. Proceedings. Eighth International Workshop on. :375-380.