Publications

Export 1435 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Journal Articles
Kim JM, Porter A, Rothermel G.  2005.  An empirical study of regression test application frequency. Software Testing, Verification and Reliability. 15(4):257-279.
Koved L, Shneiderman B.  2008.  Embedded menus: selecting items in context. Sparks of innovation in human-computer interaction.
Bowen D, Mayergoyz ID, Krafft C.  2010.  Electromagnetic Modeling of Ethernet Transformers. Magnetics, IEEE Transactions on. 46(2):563-569.
Mayergoyz ID, Zhang Z, McAvoy P, Bowen D, Krafft C.  2009.  Electromagnetic Analysis of Plasmon-Resonance Based All-Optical Magnetic Recording. Magnetics, IEEE Transactions on. 45(3):1634-1637.
Kandogan E, Shneiderman B.  1998.  Elastic windows: design, implementation, and evaluation of multi‐window operations. Software: Practice and Experience. 28(3):225-248.
El-Sana J, Evans F, Kalaiah A, Varshney A, Skiena S, Azanli E.  2000.  Efficiently computing and updating triangle strips for real-time rendering. Computer Aided Design. 32(13):753-772.
Kianzad V, Bhattacharyya SS.  2006.  Efficient techniques for clustering and scheduling onto embedded multiprocessors. IEEE Transactions on Parallel and Distributed Systems. :667-680.
Hsu CJ, Ko MY, Bhattacharyya SS, Ramasubbu S, Pino JL.  2007.  Efficient simulation of critical synchronous dataflow graphs. ACM Transactions on Design Automation of Electronic Systems (TODAES). 12(3):1-28.
Goh EJ, Jarecki S, Katz J, Wang N.  2007.  Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Journal of Cryptology. 20(4):493-514.
Huang Y, Shen C, Evans D, Katz J, Shelat A.  2011.  Efficient Secure Computation with Garbled Circuits. Information Systems Security. :28-48.
Fuchsbauer G, Katz J, Naccache D.  2010.  Efficient rational secret sharing in standard communication networks. Theory of Cryptography. :419-436.
Huang Y, Malka L, Evans D, Katz J.  2011.  Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.
Kurc T, Uysal M, Eom H, Hollingsworth J, Saltz J, Sussman A.  2000.  Efficient performance prediction for large-scale, data-intensive applications. International Journal of High Performance Computing Applications. 14(3):216-216.
Bhattacharjee B, Chawathe S, Gopalakrishnan V, Keleher P, Silaghi B.  2003.  Efficient peer-to-peer searches using result-caching. Peer-to-Peer Systems II. :225-236.
Gopalakrishnan V, Bhattacharjee B, Chawathe S, Keleher P.  2004.  Efficient peer-to-peer namespace searches. University of Maryland, College Park, MD, Tech. Rep. CSTR-4568.
Banerjee S, Kommareddy C, Bhattacharjee B.  2004.  Efficient peer location on the Internet. Computer Networks. 45(1):5-17.
Katz J, Ostrovsky R, Yung M.  2001.  Efficient password-authenticated key exchange using human-memorable passwords. Advances in Cryptology—EUROCRYPT 2001. :475-494.
Kanungo T, Mount D, Netanyahu NS, Piatko CD, Silverman R, Wu AY.  2002.  An efficient k-means clustering algorithm: analysis and implementation. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 24(7):881-892.
Andrade H, Aryangat S, Kurc T, Saltz J, Sussman A.  2004.  Efficient Execution of Multi-Query Data Analysis Batches Using Compiler Optimization Strategies. Languages and Compilers for Parallel Computing.
Banerjee S, Agrawala AK, Kramer MJ.  2002.  Efficient Data Processing using Cross Layer Hints. Technical Reports from UMIACS, UMIACS-TR-2002-59.
Katz J, Ostrovsky R, Yung M.  2009.  Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.
Lee S, Bhattacharjee B, Srinivasan A, Khuller S.  2008.  Efficient and Resilient Backbones for Multihop Wireless Networks. Mobile Computing, IEEE Transactions on. 7(11):1349-1362.
Caburlotto G, Lleò MM, Hilton T, Huq A, Colwell RR, Kaper JB.  2010.  Effect on Human Cells of Environmental Vibrio Parahaemolyticus Strains Carrying Type III Secretion System 2. Infection and ImmunityInfect. Immun.. 78(7):3280-3287.
Kitchenham B, Brereton P, Budgen D, Linkman S, Almstrum VL, Pfleeger SL, Zelkowitz MV, Wallace D.  1997.  Editorial: Evaluation and assessment in software engineering. Information and Software Technology. 39(11)
Konte M, Feamster N, Jung J.  2009.  Dynamics of online scam hosting infrastructure. Passive and Active Network Measurement. :219-228.

Pages