Publications
Export 1435 results:
Author Title [ Type![(Asc)](https://www.umiacs.umd.edu/sites/all/modules/biblio/misc/arrow-asc.png)
Filters: First Letter Of Last Name is K [Clear All Filters]
2005. An empirical study of regression test application frequency. Software Testing, Verification and Reliability. 15(4):257-279.
2008. Embedded menus: selecting items in context. Sparks of innovation in human-computer interaction.
2010. Electromagnetic Modeling of Ethernet Transformers. Magnetics, IEEE Transactions on. 46(2):563-569.
2009. Electromagnetic Analysis of Plasmon-Resonance Based All-Optical Magnetic Recording. Magnetics, IEEE Transactions on. 45(3):1634-1637.
1998. Elastic windows: design, implementation, and evaluation of multi‐window operations. Software: Practice and Experience. 28(3):225-248.
2000. Efficiently computing and updating triangle strips for real-time rendering. Computer Aided Design. 32(13):753-772.
2006. Efficient techniques for clustering and scheduling onto embedded multiprocessors. IEEE Transactions on Parallel and Distributed Systems. :667-680.
2007. Efficient simulation of critical synchronous dataflow graphs. ACM Transactions on Design Automation of Electronic Systems (TODAES). 12(3):1-28.
2007. Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Journal of Cryptology. 20(4):493-514.
2010. Efficient rational secret sharing in standard communication networks. Theory of Cryptography. :419-436.
2011. Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.
2000. Efficient performance prediction for large-scale, data-intensive applications. International Journal of High Performance Computing Applications. 14(3):216-216.
2004. Efficient peer-to-peer namespace searches. University of Maryland, College Park, MD, Tech. Rep. CSTR-4568.
2001. Efficient password-authenticated key exchange using human-memorable passwords. Advances in Cryptology—EUROCRYPT 2001. :475-494.
2002. An efficient k-means clustering algorithm: analysis and implementation. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 24(7):881-892.
2004. Efficient Execution of Multi-Query Data Analysis Batches Using Compiler Optimization Strategies. Languages and Compilers for Parallel Computing.
2002. Efficient Data Processing using Cross Layer Hints. Technical Reports from UMIACS, UMIACS-TR-2002-59.
2009. Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.
2008. Efficient and Resilient Backbones for Multihop Wireless Networks. Mobile Computing, IEEE Transactions on. 7(11):1349-1362.
2010. Effect on Human Cells of Environmental Vibrio Parahaemolyticus Strains Carrying Type III Secretion System 2. Infection and ImmunityInfect. Immun.. 78(7):3280-3287.
1997. Editorial: Evaluation and assessment in software engineering. Information and Software Technology. 39(11)
2009. Dynamics of online scam hosting infrastructure. Passive and Active Network Measurement. :219-228.