Publications

Export 124 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is Computer science  [Clear All Filters]
2012
Svec P, Gupta SK.  2012.  Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
Konte M, Feamster N.  2012.  Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
2011
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Gomez JAG, Buck-Coleman A, Plaisant C, Shneiderman B.  2011.  TreeVersity: Comparing tree structures by topology and node's attributes differences. 2011 IEEE Conference on Visual Analytics Science and Technology (VAST). :275-276.
2010
Li J, Deshpande A, Khuller S.  2010.  On Computing Compression Trees for Data Collection in Wireless Sensor Networks. 2010 Proceedings IEEE INFOCOM. :1-9.
Lee J, Keleher P, Sussman A.  2010.  Decentralized dynamic scheduling across heterogeneous multi-core desktop grids. 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW). :1-9.
Haeupler B, Saha B, Srinivasan A.  2010.  New Constructive Aspects of the Lovasz Local Lemma. 2010 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS). :397-406.
Bethencourt J, Elaine Shi, Song D.  2010.  Signatures of Reputation. Financial Cryptography and Data Security. 6052:400-407.
2009
Xu Y, Huang S-B, Ji H, Fermüller C.  2009.  Combining powerful local and global statistics for texture description. IEEE Conference on Computer Vision and Pattern Recognition, 2009. CVPR 2009. :573-580.
Han B, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2009.  Distributed Strategies for Channel Allocation and Scheduling in Software-Defined Radio Networks. IEEE INFOCOM 2009. :1521-1529.
Bonsignore EM, Dunne C, Rotman D, Smith M, Capone T, Hansen DL, Shneiderman B.  2009.  First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. International Conference on Computational Science and Engineering, 2009. CSE '09. 4:332-339.
Li J, Deshpande A, Khuller S.  2009.  Minimizing Communication Cost in Distributed Multi-query Processing. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :772-783.
Au T-C, Kuter U, Nau DS.  2009.  Planning for Interactions among Autonomous Agents. Programming Multi-Agent Systems. 5442:1-23.
Shen E, Elaine Shi, Waters B.  2009.  Predicate Privacy in Encryption Systems. Theory of Cryptography. 5444:457-473.
Song S, JaJa JF.  2009.  Techniques to audit and certify the long-term integrity of digital archives. International Journal on Digital Libraries. 10(2):123-131.
Shneiderman B.  2009.  Understanding social computing participation with visual exploration tools. International Symposium on Collaborative Technologies and Systems, 2009. CTS '09. :xi-xii-xi-xii.
2008
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
Chafekar D, Levin D, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
Nau DS, Wilkenfeld J.  2008.  Computational Cultural Dynamics. Intelligent Systems, IEEE. 23(4):18-19.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Giancarlo R, Hannenhalli S.  2008.  Guest Editors' Introduction to the Special Section on Algorithms in Bioinformatics. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 5(4):482-483.
2007
Khuller S, Martinez M, Nau DS, Sliva A, Simari G, Subrahmanian V.  2007.  Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10^30,000 worlds. Annals of Mathematics and Artificial Intelligence. 51(2):295-331.
Morselli R, Bhattacharjee B, Marsh MA, Srinivasan A.  2007.  Efficient lookup on unstructured topologies. IEEE Journal on Selected Areas in Communications. 25(1):62-72.

Pages