Publications
Export 197 results:
Author [ Title] Type Year Filters: First Letter Of Title is B [Clear All Filters]
2009. Bisimulation-based approximate lifted inference. Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence. :496-505.
2003. Bistro: a scalable and secure data transfer service for digital government applications. Commun. ACM. 46(1):50-51.
2003. Bistro: a scalable and secure data transfer service for digital government applications. Communications of the ACM. 46(1):50-51.
2007. Bitstore: An incentive-compatible solution for blocked downloads in bittorrent. Proc. Joint Workshop on The Economics of Networked Systems and Incentive-Based Computing (NetEcon).
2008. Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
2008. Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
2009. On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
2003. Blind Deconvolution Using a Regularized Structured Total Least Norm Approach. SIAM J. on Matrix Analysis and Applications. 24:1018-1037.
1980. The block conjugate gradient algorithm and related methods. Linear Algebra and its Applications. 29:293-322.
1996. The block distributed memory model. Parallel and Distributed Systems, IEEE Transactions on. 7(8):830-840.
1994. The block distributed memory model for shared memory multiprocessors. Parallel Processing Symposium, 1994. Proceedings., Eighth International. :752-756.
2006. Block preconditioners based on approximate commutators. SIAM Journal on Scientific Computing. 27(5):1651-1668.
2002. Block preconditioners for the discrete incompressible Navier–Stokes equations. International Journal for Numerical Methods in Fluids. 40(3‐4):333-344.
2009. Block-diagonal preconditioning for spectral stochastic finite-element systems. IMA Journal of Numerical Analysis. 29(2):350-350.
1996. A Block-GTH Algorithm for Finding the Stationary Vector of a Markov Chain. SIAM Journal on Matrix Applications. 17:470-488.
1988. Block-Preconditioned Conjugate-Gradient-Like Methods for Numerical Reservoir Simulation. SPE Reservoir EngineeringSPERE. 3(1)
2011. Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
2012. A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
1997. Book Preview-Designing the User Interface: Strategies for Effective Human-Computer Interaction. Interactions-New York. 4(5):61-61.
2002. Book Preview-Leonardo's Laptop: Human Needs and the New Computing Technologies. Interactions-New York. 9(4):43-43.
2011. Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
2006. Bootstrapping free-space optical networks. Selected Areas in Communications, IEEE Journal on. 24(12):13-22.