Publications

Export 1734 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Cignoni P, De Floriani L, Magillo P, Puppo E, Scopigno R.  2004.  Selective refinement queries for volume visualization of unstructured tetrahedral meshes. Visualization and Computer Graphics, IEEE Transactions on. 10(1):29-45.
Swaminathan A, Mao Y, M. Wu.  2005.  Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
Mishra A, Petroni Jr NL, Arbaugh WA, Fraser T.  2004.  Security issues in IEEE 802.11 wireless local area networks: a survey. Wireless Communications and Mobile Computing. 4(8):821-833.
Mao Y, M. Wu.  2006.  Security Issues in Cooperative Communications: Tracing Adversarial Relays. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 4:IV-IV.
Mao Y, M. Wu.  2004.  Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
Ramachandran A, Mundada Y, Tariq MB, Feamster N.  2008.  Securing enterprise networks using traffic tainting. Special Interest Group on Data Communication.
Katz J, Malka L.  2010.  Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security. :485-492.
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM.  2000.  Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.
Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D.  2012.  Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012. :416-432.
M. Wu, Mui L, Mohtashemi M, Szolovits P.  2001.  Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
M. Wu, Mui L, Mohtashemi M, Szolovits P.  2001.  Secure Health Information Sharing System: SHARE. Proceedings of the AMIA SymposiumProc AMIA Symp. :1060-1060.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Stine CO, Alam M, Tang L, Nair BG, Siddique KA, Faruque SM, Huq A, Colwell RR, Sack BR, Morris GJ.  2008.  Seasonal Cholera from Multiple Small Outbreaks, Rural Bangladesh. Emerging Infectious DiseasesEmerg Infect Dis. 14(5):831-833.
Plaisant C, Lam S, Shneiderman B, Smith MS, Roseman D, Marchand G, Gillam M, Feied C, Handler J, Rappaport H.  2008.  Searching Electronic Health Records for Temporal Patterns in Patient Histories: A Case Study with Microsoft Amalga. AMIA Annual Symposium ProceedingsAMIA Annu Symp Proc. 2008:601-605.
Daumé H, Langford J, Marcu D.  2005.  Search-based structured prediction as classification. NIPS Workshop on Advances in Structured Learning for Text and Speech Processing, Whistler, Canada.
Funkhouser T, Min P, Kazhdan M, Chen J, Halderman A, Dobkin D, Jacobs DW.  2003.  A search engine for 3D models. ACM Trans. Graph.. 22(1):83-105.
Minker J.  2012.  Scientific Freedom and Human Rights. :564.
Bertotti G, Mayergoyz ID.  2006.  The Science of Hysteresis: Mathematical modeling and applications.
LoVerde PT, Hirai H, Merrick JM, Lee NH, El-Sayed NM.  2004.  Schistosoma mansoni genome project: an update. Parasitology International. 53(2):183-192.
Roussopoulos N, Mark L.  1985.  Schema manipulation in self-describing and self-documenting data models. International Journal of Parallel Programming. 14(1):1-28.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Anil Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2009.  Scheduling on Unrelated Machines under Tree-Like Precedence Constraints. Algorithmica. 55(1):205-226.
Kembhavi A, Siddiquie B, Miezianko R, McCloskey S, Davis LS, Schwartz WR, Harwood D, Gupta A, Farrell R, Luo Y et al..  2009.  Scene it or not? incremental multiple kernel learning for object detection Proceedings of the International Conference on Computer Vision.
Kembhavi A, Siddiquie B, Miezianko R, McCloskey S, Davis LS, Schwartz WR, Harwood D, Gupta A, Farrell R, Luo Y et al..  2009.  Scene it or not? incremental multiple kernel learning for object detection Proceedings of the International Conference on Computer Vision.

Pages