Search concepts
|
Selected Filters
|
- 35,300 - 35,350 out of 40,025 results
Search results
-
Conference contribution
Seamless Deductive Inference via Macros
Sahebolamri, A., Gilray, T. & Micinski, K., Sep 19 2022, CC 2022 - Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction. Egger, B. & Smith, A. (eds.). Association for Computing Machinery, Inc, p. 77-88 12 p. (CC 2022 - Proceedings of the 31st ACM SIGPLAN International Conference on Compiler Construction).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Searches for Λb0 and Ξb0 decays to KS0pπ- and KS0pK- final states with first observation of the Λ° → KS0pπ- decay
Coutinho, R. S., 2014, Proceedings of the 49th Rencontres de Moriond - 2014 Electroweak Interactions and Unified Theories, EW 2014. Auge, E., Dumarchez, J. & Tron Thanh Van, J. (eds.). ARISF, p. 463-466 4 p. (Proceedings of the 49th Rencontres de Moriond - 2014 Electroweak Interactions and Unified Theories, EW 2014).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Search for Lorentz violation in top quark pair production and decay
Whittington, D. W., 2014, Proceedings of the 6th Meeting on CPT and Lorentz Symmetry, CPT 2013. Kostelecky, V. A. (ed.). World Scientific Publishing Co. Pte Ltd, p. 200-203 4 p. (Proceedings of the 6th Meeting on CPT and Lorentz Symmetry, CPT 2013).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Searching and search engines: When is current research going to lead to major progress?
Liddy, E. D., Dec 1 2000, Proceedings of the 2000 International Chemical Information Conference. Collier, H. & Collier, H. (eds.). p. 109-114 6 p. (Proceedings of the 2000 International Chemical Information Conference).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Searching for better randomized response schemes for privacy-preserving data mining
Huang, Z., Du, W. & Teng, Z., 2007, Knowledge Discovery in Database: PKDD 2007 - 11th European Conference on Principles and Practice of Knowledge Discovery in Databases, Proceedings. Springer Verlag, p. 487-497 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4702 LNAI).Research output: Chapter in Book/Entry/Poem › Conference contribution
Open Access2 Scopus citations -
Seasonal optimization of a dynamic thermo-optical ETFE façade system
Han, J. M. & Park, D., 2019, 16th International Conference of the International Building Performance Simulation Association, Building Simulation 2019. Corrado, V., Fabrizio, E., Gasparella, A. & Patuzzi, F. (eds.). International Building Performance Simulation Association, p. 4887-4893 7 p. (Building Simulation Conference Proceedings; vol. 7).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Second-order plasma enabled tunable low-profile frequency selective surface based on coupling inter-layer
Payne, K., Peters, E. F., Brunett, J., Wedding, D. K., Wedding, C. A. & Choi, J. H., 2016, European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 309-312 4 p. 7824340. (European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016).Research output: Chapter in Book/Entry/Poem › Conference contribution
10 Scopus citations -
Secrecy capacity of semi-deterministic wire-tap channels
Grubb, J., Vishwanath, S., Liang, Y. & Poor, H. V., Dec 1 2007, Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW. p. 199-202 4 p. 4318063. (Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW).Research output: Chapter in Book/Entry/Poem › Conference contribution
10 Scopus citations -
Secrecy capacity region of binary and Gaussian multiple access channels
Liang, Y. & Vincent Poor, H., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 1098-1106 9 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 3).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Secrecy capacity region of fading broadcast channels
Liang, Y., Poor, H. V. & Shamai, S., 2007, Proceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007. p. 1291-1295 5 p. 4557401. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
29 Scopus citations -
Secrecy capacity region of parallel broadcast channels
Liang, Y., Poor, H. V. & Shamai, S., 2007, 2007 Information Theory and Applications Workshop, Conference Proceedings, ITA. p. 245-250 6 p. 4357587. (2007 Information Theory and Applications Workshop, Conference Proceedings, ITA).Research output: Chapter in Book/Entry/Poem › Conference contribution
5 Scopus citations -
Secrecy throughput of MANETs with malicious nodes
Liang, Y., Poor, H. V. & Ying, L., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 1189-1193 5 p. 5205992. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
36 Scopus citations -
SecReS: A secure and reliable storage scheme for cloud with client-side data deduplication
Islam, T., Mistareehi, H. & Manivannan, D., Dec 2019, 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 9013469. (2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
3 Scopus citations -
Secret key capacity: Talk or keep silent?
Zhang, H., Liang, Y. & Lai, L., Sep 28 2015, Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015. Institute of Electrical and Electronics Engineers Inc., p. 291-295 5 p. 7282463. (IEEE International Symposium on Information Theory - Proceedings; vol. 2015-June).Research output: Chapter in Book/Entry/Poem › Conference contribution
9 Scopus citations -
Secret key-private key generation over three terminals: Capacity region
Zhang, H., Lai, L., Liang, Y. & Wang, H., 2014, 2014 IEEE International Symposium on Information Theory, ISIT 2014. Institute of Electrical and Electronics Engineers Inc., p. 1141-1145 5 p. 6875011. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
4 Scopus citations -
Secret sharing via noisy broadcast channels
Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
4 Scopus citations -
Secure and efficient multi-party directory publication for privacy-preserving data sharing
Areekijseree, K., Tang, Y., Chen, J., Wang, S., Iyengar, A. & Palanisamy, B., 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Li, Y., Chang, B., Zhu, S. & Beyah, R. (eds.). Springer Verlag, p. 71-94 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 254).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Secure and Private Sequence Comparisons
Atallah, M. J., Kerschbaum, F. & Du, W., 2003, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003. Samarati, P. & Syverson, P. (eds.). Association for Computing Machinery, p. 39-44 6 p. (Proceedings of the ACM Workshop on Privacy in the Electronic Society).Research output: Chapter in Book/Entry/Poem › Conference contribution
145 Scopus citations -
Secure broadcasting over fading channels with statistical QoS constraints
Qiao, D., Gursoy, M. C. & Velipasalar, S., 2010, 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 5683470. (GLOBECOM - IEEE Global Telecommunications Conference).Research output: Chapter in Book/Entry/Poem › Conference contribution
5 Scopus citations -
Secure coding over networks
Xu, J. & Chen, B., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2116-2120 5 p. 5205251. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Secure communication in the low-SNR regime: A characterization of the energy-secrecy tradeoff
Gursoy, M. C., 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2291-2295 5 p. 5205914. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
15 Scopus citations -
Secure communication over fading channels
Liang, Y. & Poor, H. V., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 817-823 7 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 2).Research output: Chapter in Book/Entry/Poem › Conference contribution
11 Scopus citations -
Secure communication over fading channels with statistical QoS constraints
Qiao, D., Gursoy, M. C. & Velipasalar, S., 2010, 2010 IEEE International Symposium on Information Theory, ISIT 2010 - Proceedings. p. 2503-2507 5 p. 5513448. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Secure consistency verification for untrusted cloud storage by public blockchains
Li, K., Tang, Y., Kim, B. H. B. & Xu, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 39-62 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems
Yoon, M. K., Mohan, S., Choi, J., Kim, J. E. & Sha, L., 2013, 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium, RTAS 2013. p. 21-32 12 p. 6531076. (Real-Time Technology and Applications - Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
66 Scopus citations -
Secure distributed detection in the presence of eavesdroppers
Nadendla, V. S. S., Chen, H. & Varshney, P. K., Dec 1 2010, Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010. p. 1437-1441 5 p. 5757773. (Conference Record - Asilomar Conference on Signals, Systems and Computers).Research output: Chapter in Book/Entry/Poem › Conference contribution
18 Scopus citations -
Secured tag identification using EDSA (Enhanced Distributed Scalable Architecture)
Ahamed, S. I., Rahman, F. & Hoque, M. E., Dec 3 2008, Proceedings of the 23rd Annual ACM Symposium on Applied Computing, SAC'08. p. 1902-1907 6 p. (Proceedings of the ACM Symposium on Applied Computing).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Secure multi-party computational geometry
Atallah, M. J. & Du, W., 2001, Algorithms and Data Structures - 7th International Workshop, WADS 2001, Proceedings. Dehne, F., Sack, J-R. & Tamassia, R. (eds.). Springer Verlag, p. 165-179 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2125).Research output: Chapter in Book/Entry/Poem › Conference contribution
101 Scopus citations -
Secure nested codes for type II wiretap channels
Liu, R., Liang, Y., Poor, H. V. & Spasojević, P., 2007, 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. p. 337-342 6 p. 4313097. (2007 IEEE Information Theory Workshop, ITW 2007, Proceedings).Research output: Chapter in Book/Entry/Poem › Conference contribution
81 Scopus citations -
Secure relay beamforming over cognitive radio channels
Zhang, J. & Gursoy, M. C., 2011, 2011 45th Annual Conference on Information Sciences and Systems, CISS 2011. 5766188. (2011 45th Annual Conference on Information Sciences and Systems, CISS 2011).Research output: Chapter in Book/Entry/Poem › Conference contribution
15 Scopus citations -
Securing app distribution process of iOS exploiting the notion of authentic update
Akter, S., Rahman, F. & Al Islam, A. B. M. A., Feb 5 2016, Proceedings of 2016 International Conference on Networking Systems and Security, NSysS 2016. Institute of Electrical and Electronics Engineers Inc., 7400689. (Proceedings of 2016 International Conference on Networking Systems and Security, NSysS 2016).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Securing BGP through keychain-based signatures
Heng, Y., Bo, S., Haining, W. & Jianping, P., 2007, 2007 Fifteenth IEEE International Workshop on Quality of Service, IWQoS 2007. p. 154-163 10 p. 4262466. (IEEE International Workshop on Quality of Service, IWQoS).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Securing highly-sensitive information in smart mobile devices through difficult-to-mimic and single-time usage analytics
Sarmin, S., Anzum, N., Zubaer, K. H., Rahman, F. & Al Islam, A. B. M. A., Nov 5 2018, Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2018. Association for Computing Machinery, p. 322-331 10 p. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Entry/Poem › Conference contribution
Open Access -
Securing Mobile Systems GPS and Camera Functions Using TrustZone Framework
Salman, A. S. & Du, W., 2021, Intelligent Computing - Proceedings of the 2021 Computing Conference. Arai, K. (ed.). Springer Science and Business Media Deutschland GmbH, p. 868-884 17 p. (Lecture Notes in Networks and Systems; vol. 285).Research output: Chapter in Book/Entry/Poem › Conference contribution
3 Scopus citations -
Security analysis and enhancement of model compressed deep learning systems under adversarial attacks
Liu, Q., Liu, T., Liu, Z., Wang, Y., Jin, Y. & Wen, W., Feb 20 2018, ASP-DAC 2018 - 23rd Asia and South Pacific Design Automation Conference, Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 721-726 6 p. (Proceedings of the Asia and South Pacific Design Automation Conference, ASP-DAC; vol. 2018-January).Research output: Chapter in Book/Entry/Poem › Conference contribution
29 Scopus citations -
Security Automation for Information Security Continuous Monitoring: Research Framework
AlSadhan, T. & Park, J. S., Aug 31 2016, Proceedings - 2016 IEEE World Congress on Services, SERVICES 2016. Institute of Electrical and Electronics Engineers Inc., p. 130-131 2 p. 7557410Research output: Chapter in Book/Entry/Poem › Conference contribution
4 Scopus citations -
Security-Aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach
Kwiat, L., Kamhoua, C. A., Kwiat, K. A., Tang, J. & Martin, A., Aug 19 2015, Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015. Pu, C. & Mohindra, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 556-563 8 p. 7214090. (Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015).Research output: Chapter in Book/Entry/Poem › Conference contribution
25 Scopus citations -
Security challenges and countermeasures for trusted virtualized computing environments
Brooks, T., Caicedo, C. & Park, J., Oct 11 2012, World Congress on Internet Security, WorldCIS-2012. p. 117-122 6 p. 6280210. (World Congress on Internet Security, WorldCIS-2012).Research output: Chapter in Book/Entry/Poem › Conference contribution
4 Scopus citations -
Security Issues in IPv6 Networks
Caicedo Bastidas, C. E. & Joshi, J., 2008, Proceedings of the ITERA 2008 Conference. Louisville, KYResearch output: Chapter in Book/Entry/Poem › Conference contribution
-
Security models for contextual based global processing an architecture and overview
Vert, G., Iyengar, S. S. & Phoha, V., 2009, CSIIRW09: Fifth Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies. 53. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Security relevancy analysis on the registry of windows NT 4.0
Du, W., Garg, P. & Mathur, A. P., 1999, Proceedings - 15th Annual Computer Security Applications Conference, ACSAC 1999. Association for Computing Machinery, p. 331-338 8 p. 816044. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. Part F133431).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
SEED: A suite of instructional laboratories for computer SEcurity EDucation
Du, W., Teng, Z. & Wang, R., 2007, SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education. p. 486-490 5 p. (SIGCSE 2007: 38th SIGCSE Technical Symposium on Computer Science Education).Research output: Chapter in Book/Entry/Poem › Conference contribution
Open Access7 Scopus citations -
SEED Emulator: An Internet Emulator for Research and Education
Du, W., Zeng, H. & Won, K., Nov 14 2022, HotNets 2022 - Proceedings of the 2022 21st ACM Workshop on Hot Topics in Networks. Association for Computing Machinery, Inc, p. 101-107 7 p. (HotNets 2022 - Proceedings of the 2022 21st ACM Workshop on Hot Topics in Networks).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Seeing beyond visibility: A four way fusion of user authentication for efficient usable security on mobile devices
Rahman, F., Gani, M. O., Ahsan, G. M. T. & Ahamed, S. I., Sep 17 2014, Proceedings - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014. Institute of Electrical and Electronics Engineers Inc., p. 121-129 9 p. 6901649. (Proceedings - 8th International Conference on Software Security and Reliability - Companion, SERE-C 2014).Research output: Chapter in Book/Entry/Poem › Conference contribution
12 Scopus citations -
Segmentation via annealed motion estimates
Abdel-Qader, I. & Bujanovic, T., Jan 1 2004, 2009 IEEE MTT-S International Microwave Workshop Series on Signal Integrity and High-Speed Interconnects, IMWS 2009. IEEE Computer Society, p. 297-301 5 p. 4569396. (2004 IEEE Electro/Information Technology Conference, EIT 2004).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Seismic analysis of solid waste landfills
Del Nero, D. E., Corcoran, B. W. & Bhatia, S. K., 1995, Geotechnical Special Publication. 54 ed. American Society of Civil Engineers (ASCE), p. 61-72 12 p.Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations -
Seismic performance study on the joint of crisscross concrete-filled steel tube column-steel beam in different axial compression ratios
Xu, Y. F., Zhu, S. J., Xu, P. Y. & Aboutaha, R. S., 2014, Advances in Civil Structures IV. Trans Tech Publications Ltd, p. 305-308 4 p. (Applied Mechanics and Materials; vol. 578-579).Research output: Chapter in Book/Entry/Poem › Conference contribution
1 Scopus citations -
Seismic retrofit of R/C columns using steel jackets
Aboutaha, R. S., Engelhardt, M. D., Jirsa, J. O. & Kreger, M. E., Jun 1 1996, Seismic Rehabilitation of Concrete Structures. Sabnis, G. M., Shroff, A. C. & Kahn, L. F. (eds.). American Concrete Institute, p. 59-72 14 p. (American Concrete Institute, ACI Special Publication; vol. SP-160).Research output: Chapter in Book/Entry/Poem › Conference contribution
3 Scopus citations -
Seismic retrofit of R/C columns with inadequate lap splices
Aboutaha, R. S., Engelhardt, M. D., Jisra, J. O. & Kreger, M. E., Jan 1 1994, Structures Congress XII. Publ by ASCE, p. 1502-1507 6 p. (Structures Congress XII).Research output: Chapter in Book/Entry/Poem › Conference contribution
-
Seismic strengthening of R/C columns using steel jackets
Aboutaha, R. S., Engelhardt, M. D., Jirsa, J. O. & Kreger, M. E., Jan 1 1993, Structural Engineering in Natural Hazards Mitigation. Publ by ASCE, p. 301-306 6 p. (Structural Engineering in Natural Hazards Mitigation).Research output: Chapter in Book/Entry/Poem › Conference contribution
2 Scopus citations