Search concepts
|
Selected Filters
|
- 28,950 - 29,000 out of 37,829 results
Search results
-
Secondary metal-ligand cationic subunits {ML}n+ as structural determinants in the oxovanadium/phenylphosphonate/{ML}n+ system, where {ML} is a Cu2+/organonitrogen moiety
Yucesan, G., Ming, H. Y., Ouellette, W., O'Connor, C. J. & Zubieta, J., Jul 19 2005, In: CrystEngComm. 7, p. 480-490 11 p.Research output: Contribution to journal › Article › peer-review
32 Scopus citations -
Secondary pollutants from ozone reactions with ventilation filters and degradation of filter media additives
Destaillats, H., Chen, W., Apte, M. G., Li, N., Spears, M., Almosni, J., Brunner, G., Zhang, J. J. & Fisk, W. J., Jul 2011, In: Atmospheric Environment. 45, 21, p. 3561-3568 8 p.Research output: Contribution to journal › Article › peer-review
28 Scopus citations -
Secondary transport of metalcitrate complexes: The CitMHS family
Lensbouer, J. J. & Doyle, R. P., Oct 2010, In: Critical Reviews in Biochemistry and Molecular Biology. 45, 5, p. 453-462 10 p.Research output: Contribution to journal › Review article › peer-review
12 Scopus citations -
Second-generation genetic linkage map of catfish and its integration with the BAC-based physical map
Ninwichian, P., Peatman, E., Liu, H., Kucuktas, H., Somridhivej, B., Liu, S., Li, P., Jiang, Y., Sha, Z., Kaltenboeck, L., Abernathy, J. W., Wang, W., Chen, F., Lee, Y., Wong, L., Wang, S., Lu, J. & Liu, Z., Oct 2012, In: G3: Genes, Genomes, Genetics. 2, 10, p. 1233-1241 9 p.Research output: Contribution to journal › Article › peer-review
40 Scopus citations -
Second language learners’ use of requests and responses in elementary classrooms
Wilkinson, L. C., Milosky, L. M. & Genishi, C., Mar 1986, In: Topics in Language Disorders. 6, 2, p. 57-70 14 p.Research output: Contribution to journal › Article › peer-review
4 Scopus citations -
Second-order change in marriage and family therapy: A web-based modified Delphi study
Davey, M., Duncan, T., Kissil, K., Davey, A. & Fish, L. S., Mar 1 2011, In: American Journal of Family Therapy. 39, 2, p. 100-111 12 p.Research output: Contribution to journal › Article › peer-review
5 Scopus citations -
Second-order plasma enabled tunable low-profile frequency selective surface based on coupling inter-layer
Payne, K., Peters, E. F., Brunett, J., Wedding, D. K., Wedding, C. A. & Choi, J. H., 2016, European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 309-312 4 p. 7824340. (European Microwave Week 2016: "Microwaves Everywhere", EuMW 2016 - Conference Proceedings; 46th European Microwave Conference, EuMC 2016).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
9 Scopus citations -
Second stage string fragmentation model
Al-Aithan, T. & Rosenzweig, C., Jul 1 1998, In: Physical Review D - Particles, Fields, Gravitation and Cosmology. 58, 1, p. 140181-140188 8 p., 014018.Research output: Contribution to journal › Article › peer-review
-
Second-tier events, health initiatives will gain foothold in 2015
Burton, R. & O'Reilly, N., 2015, Sports Business Journal, 17, 40, p. 22 1 p.Research output: Contribution to specialist publication › Article
-
Secrecy capacity of semi-deterministic wire-tap channels
Grubb, J., Vishwanath, S., Liang, Y. & Poor, H. V., Dec 1 2007, Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW. p. 199-202 4 p. 4318063. (Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, ITW).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
10 Scopus citations -
Secrecy capacity region of binary and Gaussian multiple access channels
Liang, Y. & Vincent Poor, H., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 1098-1106 9 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 3).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Secrecy capacity region of fading broadcast channels
Liang, Y., Poor, H. V. & Shamai, S., 2007, Proceedings - 2007 IEEE International Symposium on Information Theory, ISIT 2007. p. 1291-1295 5 p. 4557401. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
28 Scopus citations -
Secrecy capacity region of parallel broadcast channels
Liang, Y., Poor, H. V. & Shamai, S., 2007, 2007 Information Theory and Applications Workshop, Conference Proceedings, ITA. p. 245-250 6 p. 4357587. (2007 Information Theory and Applications Workshop, Conference Proceedings, ITA).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
8 Scopus citations -
Secrecy throughput of MANETs under passive and active attacks
Liang, Y., Poor, H. V. & Ying, L., Oct 2011, In: IEEE Transactions on Information Theory. 57, 10, p. 6692-6702 11 p., 6034725.Research output: Contribution to journal › Article › peer-review
31 Scopus citations -
Secrecy throughput of MANETs with malicious nodes
Liang, Y., Poor, H. V. & Ying, L., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 1189-1193 5 p. 5205992. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
36 Scopus citations -
SecReS: A secure and reliable storage scheme for cloud with client-side data deduplication
Islam, T., Mistareehi, H. & Manivannan, D., Dec 2019, 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 9013469. (2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Secret communication under channel uncertainty
Liang, Y., Poor, H. V. & Shamai, S., 2010, Securing Wireless Communications at the Physical Layer. Springer US, p. 113-141 29 p.Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Secretion: Essential transport at the plasma membrane
Silver, R. B., Jan 2005, In: Anatomical Record - Part B New Anatomist. 282, 1, p. 1-2 2 p.Research output: Contribution to journal › Editorial › peer-review
-
Secretion of functional formate dehydrogenase in Pichia pastoris
Takacs, M., Makhlynets, O. V., Tolbert, P. L. & Korendovych, I. V., May 1 2017, In: Protein Engineering, Design and Selection. 30, 5, p. 381-386 6 p.Research output: Contribution to journal › Article › peer-review
Open Access6 Scopus citations -
Secretion without membrane fusion: Porocytosis
Silver, R. B. & Pappas, G. D., Jan 1 2005, In: Anatomical Record - Part B New Anatomist. 282, 1, p. 18-37 20 p.Research output: Contribution to journal › Review article › peer-review
9 Scopus citations -
Secret key capacity: Talk or keep silent?
Zhang, H., Liang, Y. & Lai, L., Sep 28 2015, Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015. Institute of Electrical and Electronics Engineers Inc., p. 291-295 5 p. 7282463. (IEEE International Symposium on Information Theory - Proceedings; vol. 2015-June).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
9 Scopus citations -
Secret key-private key generation over three terminals: Capacity region
Zhang, H., Lai, L., Liang, Y. & Wang, H., 2014, 2014 IEEE International Symposium on Information Theory, ISIT 2014. Institute of Electrical and Electronics Engineers Inc., p. 1141-1145 5 p. 6875011. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Scopus citations -
Secret sharing via noisy broadcast channels
Lai, L., Liang, Y., Du, W. & Shamai, S., 2011, 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011. p. 1955-1959 5 p. 6033894. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Scopus citations -
Sectional curvature for Riemannian manifolds with density
Wylie, W., Oct 24 2015, In: Geometriae Dedicata. 178, 1, p. 151-169 19 p.Research output: Contribution to journal › Article › peer-review
19 Scopus citations -
Secular blasphemy: Utter(ed) transgressions against names and fathers in the postmodern era
Haywood Rolling, J., 2008, In: Qualitative Inquiry. 14, 6, p. 926-948 23 p.Research output: Contribution to journal › Article › peer-review
6 Scopus citations -
Secure and efficient multi-party directory publication for privacy-preserving data sharing
Areekijseree, K., Tang, Y., Chen, J., Wang, S., Iyengar, A. & Palanisamy, B., 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Li, Y., Chang, B., Zhu, S. & Beyah, R. (eds.). Springer Verlag, p. 71-94 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 254).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations -
Secure and efficient tag searching in RFID systems using serverless search protocol
Ahamed, S. I., Rahman, F., Hoque, E., Kawsar, F. & Nakajima, T., Dec 1 2008, In: International Journal of Security and its Applications. 2, 4, p. 57-66 10 p.Research output: Contribution to journal › Article › peer-review
11 Scopus citations -
Secure and Private Sequence Comparisons
Atallah, M. J., Kerschbaum, F. & Du, W., 2003, Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003. Samarati, P. & Syverson, P. (eds.). Association for Computing Machinery, p. 39-44 6 p. (Proceedings of the ACM Workshop on Privacy in the Electronic Society).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
141 Scopus citations -
Secure and resilient localization in wireless sensor networks
Ning, P., Liu, D. & Du, W., Dec 1 2007, Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Poovendran, R., Roy, S. & Wang, C. (eds.). p. 161-184 24 p. (Advances in Information Security; vol. 30).Research output: Chapter in Book/Report/Conference proceeding › Chapter
-
Secure broadcasting over fading channels with statistical QoS constraints
Qiao, D., Gursoy, M. C. & Velipasalar, S., 2010, 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010. 5683470. (GLOBECOM - IEEE Global Telecommunications Conference).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
5 Scopus citations -
Secure coding over networks
Xu, J. & Chen, B., Nov 19 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2116-2120 5 p. 5205251. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Secure coding over networks against noncooperative eavesdropping
Xu, J. & Chen, B., Jul 2013, In: IEEE Transactions on Information Theory. 59, 7, p. 4498-4509 12 p., 6502716.Research output: Contribution to journal › Article › peer-review
3 Scopus citations -
Secure communication in the low-SNR regime: A characterization of the energy-secrecy tradeoff
Gursoy, M. C., 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2291-2295 5 p. 5205914. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
15 Scopus citations -
Secure communication in the low-SNR regime
Gursoy, M. C., Apr 2012, In: IEEE Transactions on Communications. 60, 4, p. 1114-1123 10 p., 6155699.Research output: Contribution to journal › Article › peer-review
31 Scopus citations -
Secure communication over fading channels
Liang, Y., Poor, H. V. & Shamai, S., Jun 2008, In: IEEE Transactions on Information Theory. 54, 6, p. 2470-2492 23 p.Research output: Contribution to journal › Article › peer-review
706 Scopus citations -
Secure communication over fading channels
Liang, Y. & Poor, H. V., 2006, 44th Annual Allerton Conference on Communication, Control, and Computing 2006. University of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering, p. 817-823 7 p. (44th Annual Allerton Conference on Communication, Control, and Computing 2006; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
43 Scopus citations -
Secure communication over fading channels with statistical QoS constraints
Qiao, D., Gursoy, M. C. & Velipasalar, S., 2010, 2010 IEEE International Symposium on Information Theory, ISIT 2010 - Proceedings. p. 2503-2507 5 p. 5513448. (IEEE International Symposium on Information Theory - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Secure communications over wireless broadcast networks: Stability and utility maximization
Liang, Y., Poor, H. V. & Ying, L., Sep 2011, In: IEEE Transactions on Information Forensics and Security. 6, 3 PART 1, p. 682-692 11 p., 5782980.Research output: Contribution to journal › Article › peer-review
30 Scopus citations -
Secure Communications via Physical-Layer and Information-Theoretic Techniques [Scanning the Issue]
Regalia, P. A., Khisti, A., Liang, Y. & Tomasin, S., 2015, In: Proceedings of the IEEE. 103, 10, p. 1698-1701 4 p., 7270414.Research output: Contribution to journal › Article › peer-review
27 Scopus citations -
Secure consistency verification for untrusted cloud storage by public blockchains
Li, K., Tang, Y., Kim, B. H. B. & Xu, J., 2019, Security and Privacy in Communication Networks - 15th EAI International Conference, SecureComm 2019, Proceedings. Chen, S., Choo, K-K. R., Fu, X., Lou, W. & Mohaisen, A. (eds.). Springer, p. 39-62 24 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 304 LNICST).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Scopus citations -
Secure cookies on the web
Park, J. S. & Sandhu, R., Jul 2000, In: IEEE Internet Computing. 4, 4, p. 36-44 9 p.Research output: Contribution to journal › Article › peer-review
92 Scopus citations -
SecureCore: A multicore-based intrusion detection architecture for real-time embedded systems
Yoon, M. K., Mohan, S., Choi, J., Kim, J. E. & Sha, L., 2013, 2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium, RTAS 2013. p. 21-32 12 p. 6531076. (Real-Time Technology and Applications - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
61 Scopus citations -
Secure distributed detection in the presence of eavesdroppers
Nadendla, V. S. S., Chen, H. & Varshney, P. K., Dec 1 2010, Conference Record of the 44th Asilomar Conference on Signals, Systems and Computers, Asilomar 2010. p. 1437-1441 5 p. 5757773. (Conference Record - Asilomar Conference on Signals, Systems and Computers).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
18 Scopus citations -
Secured tag identification using EDSA (Enhanced Distributed Scalable Architecture)
Ahamed, S. I., Rahman, F. & Hoque, M. E., Dec 3 2008, Proceedings of the 23rd Annual ACM Symposium on Applied Computing, SAC'08. p. 1902-1907 6 p. (Proceedings of the ACM Symposium on Applied Computing).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations -
Secure multi-party computational geometry
Atallah, M. J. & Du, W., 2001, Algorithms and Data Structures - 7th International Workshop, WADS 2001, Proceedings. Dehne, F., Sack, J-R. & Tamassia, R. (eds.). Springer Verlag, p. 165-179 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2125).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
222 Scopus citations -
Secure Multi-pArty Computation Grid LOgistic REgression (SMAC-GLORE)
Shi, H., Jiang, C., Dai, W., Jiang, X., Tang, Y., Ohno-Machado, L. & Wang, S., Jul 25 2016, In: BMC Medical Informatics and Decision Making. 16, 89.Research output: Contribution to journal › Article › peer-review
27 Scopus citations -
Secure multi-party computation problems and their applications: A review and open problems
Du, W. & Atallah, M. J., Dec 1 2001, p. 13-22. 10 p.Research output: Contribution to conference › Paper › peer-review
312 Scopus citations -
Secure nested codes for type II wiretap channels
Liu, R., Liang, Y., Poor, H. V. & Spasojević, P., 2007, 2007 IEEE Information Theory Workshop, ITW 2007, Proceedings. p. 337-342 6 p. 4313097. (2007 IEEE Information Theory Workshop, ITW 2007, Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
81 Scopus citations -
Secure networked inference with unreliable data sources
Vempaty, A., Kailkhura, B. & Varshney, P. K., Jan 1 2018, Springer Singapore. 208 p.Research output: Book/Report › Book
1 Scopus citations -
Secure relay beamforming over cognitive radio channels
Zhang, J. & Gursoy, M. C., 2011, 2011 45th Annual Conference on Information Sciences and Systems, CISS 2011. 5766188. (2011 45th Annual Conference on Information Sciences and Systems, CISS 2011).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
15 Scopus citations