Publications
Export 1377 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is R [Clear All Filters]
2009. Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
2004. Social and psychological influences on computer user frustration. Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use. :91-103.
1994. Transforming queries from a relational schema to an object schema: A prototype based on F-logic. Methodologies for Intelligent SystemsMethodologies for Intelligent Systems. 869:154-163.
1994. Transforming queries from a relational schema to an object schema: A prototype based on F-logic. Methodologies for Intelligent SystemsMethodologies for Intelligent Systems. 869:154-163.
2006. What Is the Range of Surface Reconstructions from a Gradient Field? Computer Vision – ECCV 2006Computer Vision – ECCV 2006. 3951:578-591.
2003. The World's Information in Digital Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :149-149.
2003. Video Mining.
1991. Visual recovery.