Publications
Export 1435 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
2005. Categorized Graphical Overviews for Web Search Results: An Exploratory Study using U.S. Government Agencies as a Meaningful and Stable Structure (2004). Institute for Systems Research Technical Reports.
2006. Categorizing web search results into meaningful and stable categories using fast-feature techniques. Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries. :210-219.
2006. Categorizing web search results into meaningful and stable categories using fast-feature techniques. Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries. :210-219.
2005. Catergorized Overviews for Web Search Results: Two Exploratory Studies in the US Government Domain. Technical Reports from UMIACS.
2010. Cellular traffic offloading through opportunistic communications: a case study. Proceedings of the 5th ACM workshop on Challenged networks. :31-38.
2003. Characterization of a Vibrio cholerae phage isolated from the coastal water of Peru. Environmental Microbiology. 5(5):350-354.
2006. Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology. 19(1):67-95.
2004. CHARMED: A multi-objective co-synthesis framework for multi-mode embedded systems. Application-Specific Systems, Architectures and Processors, 2004. Proceedings. 15th IEEE International Conference on. :28-40.
2011. CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
2011. CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
2007. Chit-based access control.
2000. A chosen ciphertext attack against several e-mail encryption protocols. Ninth USENIX Security Symposium.
2007. Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.
2004. Chosen-ciphertext security from identity-based encryption. Advances in Cryptology-Eurocrypt 2004. :207-222.
2000. Chromosome Identification Using Hidden Markov Models: Comparison with Neural Networks, Singular Value Decomposition, Principal Components Analysis, and Fisher Discriminant Analysis. Laboratory Investigation. 80(11):1629-1641.
2011. Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1(1)
1995. Code generation for multiple mappings. Frontiers of Massively Parallel Computation, 1995. Proceedings. Frontiers '95., Fifth Symposium on the. :332-341.
2010. Coherent turbulent motions in a Mach 3 boundary layer. Bulletin of the American Physical Society. 55
1997. Collabcad: A toolkit for integrated synchronous and asynchronous sharing of cad applications. Proceedings TeamCAD: GVU/NIST Workshop on Collaborative Design, Atlanta, GA, USA. :131-137.
2012. Collecting Semantic Similarity Ratings to Connect Concepts in Assistive Communication Tools. Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures. 370:81-93.
2011. Collective graph identification. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. :87-95.