Publications

Export 377 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is Y  [Clear All Filters]
Book Chapters
Hicks MW, Nettles S.  2000.  Active Networking Means Evolution (or Enhanced Extensibility Required). Active NetworksActive Networks. 1942:16-32.
Choi SGeol, Dachman-Soled D, Yung M.  2012.  On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
Ma K-K, Yit Phang K, Foster JS, Hicks MW.  2011.  Directed Symbolic Execution. Static AnalysisStatic Analysis. 6887:95-111.
Ma K-K, Yit Phang K, Foster JS, Hicks MW.  2011.  Directed Symbolic Execution. Static AnalysisStatic Analysis. 6887:95-111.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2009.  Efficient Robust Private Set Intersection. Applied Cryptography and Network Security. :125-142.
Pratikakis P, Foster JS, Hicks MW.  2006.  Existential Label Flow Inference Via CFL Reachability. Static AnalysisStatic Analysis. 4134:88-106.
Kale A, Cuntoor N, Yegnanarayana B, Rajagopalan AN, Chellappa R.  2003.  Gait Analysis for Human Identification. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1058-1058.
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V.  2004.  Plan Databases: Model and Algebra. Foundations of Information and Knowledge Systems. 2942:302-319.
Yue Z, Zhao W, Chellappa R.  2005.  Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
Udrea O, Yu D, Hung E, Subrahmanian V.  2005.  Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
Anagnostakis K, Hicks MW, Ioannidis S, Keromytis A, Smith J.  2000.  Scalable Resource Control in Active Networks. Active NetworksActive Networks. 1942:343-357.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Sharma P, Khurana U, Shneiderman B, Scharrenbroich M, Locke J.  2011.  Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
Papamanthou C, Shi E, Tamassia R, Yi K.  2013.  Streaming Authenticated Data Structures. Advances in Cryptology – EUROCRYPT 2013. :353-370.
Ahn J-wook, Taieb-Maimon M, Sopan A, Plaisant C, Shneiderman B.  2011.  Temporal Visualization of Social Network Dynamics: Prototypes for Nation of Neighbors. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:309-316.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
Conference Papers
Yacoob Y, Gold YI.  1989.  3D object recognition via simulated particles diffusion. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1989. Proceedings CVPR '89. :442-449.
Yuan Y, Gu D, Arbaugh WA, Zhang J.  2004.  Achieving packet-level quality of service through scheduling in multirate WLANs. Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. 4:2730-2734Vol.4-2730-2734Vol.4.
Chen D, Bilgic M, Getoor L, Jacobs DW, Mihalkova L, Tom Yeh.  2011.  Active inference for retrieval in camera networks. Person-Oriented Vision (POV), 2011 IEEE Workshop on. :13-20.
Chen D, Bilgic M, Getoor L, Jacobs DW, Mihalkova L, Tom Yeh.  2011.  Active inference for retrieval in camera networks. Person-Oriented Vision (POV), 2011 IEEE Workshop on. :13-20.

Pages