Book Chapters

Pages

Dorr BJ, Hovy E, Levin L. Machine Translation: Interlingual Methods. In: Brown E-in-C:   K, editor. Encyclopedia of Language & Linguistics (Second Edition)Encyclopedia of Language & Linguistics (Second Edition). Oxford: Elsevier; 2006. 3. p. 383-394p.
Iwerks GS, Samet H, Smith KP. Maintenance of Spatial Semijoin Queries on Moving Points. In: Proceedings 2004 VLDB ConferenceProceedings 2004 VLDB Conference. St Louis: Morgan Kaufmann; 2004. 8. p. 828-839p.
Papageorgiou P, Hicks MW. Merging Network Measurement with Data Transport. In: Dovrolis C, editor. Passive and Active Network MeasurementPassive and Active Network Measurement. Vol 3431. Springer Berlin / Heidelberg; 2005. 3. p. 368-371p. (Lecture Notes in Computer Science; vol 3431).
Mount SM. Messenger RNA splicing signals in Drosophila genes. In: Atlas of Drosophila Genes. Oxford University Press, New York, NY; 1993. 3. p. 333-358p.
Liu X, Doermann D, Li H. Mobile Visual Aid Tools for Users with Visual Impairments. In: Mobile Multimedia ProcessingMobile Multimedia Processing. LNSC 5960; 2010. 2. p. 21-36p.
Nixon MS, Tan T, Chellappa R. Model-Based Approaches. In: Human Identification Based on GaitHuman Identification Based on Gait.; 2006. 1. p. 107-133p.
Eaton E, desJardins M, Lane T. Modeling Transfer Relationships Between Learning Tasks for Improved Inductive Transfer. In: Daelemans W, Goethals B, Morik K, editors. Machine Learning and Knowledge Discovery in DatabasesMachine Learning and Knowledge Discovery in Databases. Vol 5211. Springer Berlin / Heidelberg; 2008. 3. p. 317-332p. (Lecture Notes in Computer Science; vol 5211).
Rust BW, O'Leary DP, Mullen KM. Modelling Type 1a Supernova Light Curves. In: Pereyra V, Scherer G, editors. Exponential Data Fitting and Its ApplicationsExponential Data Fitting and Its Applications. Bentham Science Publishers Ltd.; 2010. 1. p. 169-186p.
Vaswani N, Agrawal A, Zheng Q, Chellappa R. Moving Object Detection and Compression in IR Sequences. In: Bhanu B, Pavlidis I, editors. Computer Vision Beyond the Visible SpectrumComputer Vision Beyond the Visible Spectrum. Springer London; 2005. 1. p. 141-165p. (Advances in Pattern Recognition).
Ayan N, Dorr BJ, Habash N. Multi-align: Combining Linguistic and Statistical Techniques to Improve Alignments for Adaptable MT. In: Frederking R, Taylor K, editors. Machine Translation: From Real Users to ResearchMachine Translation: From Real Users to Research. Vol 3265. Springer Berlin / Heidelberg; 2004. 1. p. 17-26p. (Lecture Notes in Computer Science; vol 3265).
Sundaresan A, Chellappa R. Multi-camera Tracking of Articulated Human Motion Using Motion and Shape Cues. In: Narayanan P, Nayar S, Shum H-Y, editors. Computer Vision – ACCV 2006Computer Vision – ACCV 2006. Vol 3852. Springer Berlin / Heidelberg; 2006. 1. p. 131-140p. (Lecture Notes in Computer Science; vol 3852).
Zhu G, Zheng Y, Doermann D, Jaeger S. Multi-scale Structural Saliency for Signature Detection. In: IEEEConference on Computer Vision and Pattern Recognition (CVPR 2007)IEEEConference on Computer Vision and Pattern Recognition (CVPR 2007). Minneapolis, MN; 2007. 1. p. 1-8p.
Samet H. Multidimensional data structures for spatial applications. In: Atallah MJ, Blanton M, editors. Algorithms and theory of computation handbookAlgorithms and theory of computation handbook. Chapman & Hall/CRC; 2010. 6. p. 6.
Bederson BB, Plaisant C. Navigation Patterns and Usability of Zoomable User Interfaces With and Without an Overview. In: The craft of information visualization: readings and reflections. Morgan Kaufmann Publishers Inc.; 2003. 1. p. 120.
Hicks MW, Kakkar P, Moore J, Gunter C, Nettles S. Network Programming Using PLAN. In: Bal H, Belkhouche B, Cardelli L, editors. Internet Programming LanguagesInternet Programming Languages. Vol 1686. Springer Berlin / Heidelberg; 1999. 1. p. 127-143p. (Lecture Notes in Computer Science; vol 1686).
Mount D, Netanyahu NS, Ratanasanya S. New Approaches to Robust, Point-Based Image Registration. In: LeMoigne J, Netanyahu NS, Eastman RD, editors. Image Registration for Remote SensingImage Registration for Remote Sensing. Cambridge University Press; 2010.
Baker P, Pless R, Fermüller C, Aloimonos Y. New Eyes for Shape and Motion Estimation. In: Lee S-W, Bülthoff H, Poggio T, editors. Biologically Motivated Computer VisionBiologically Motivated Computer Vision. Vol 1811. Springer Berlin / Heidelberg; 2000. 2. p. 23-47p. (Lecture Notes in Computer Science; vol 1811).
Elaine Shi, Chan T, Stefanov E, Li M. Oblivious RAM with O((logN)^3) Worst-Case Cost. In: Lee D, Wang X, editors. Advances in Cryptology – ASIACRYPT 2011. Vol 7073. Springer Berlin / Heidelberg; 2011. 1. p. 197-214p. (Lecture Notes in Computer Science; vol 7073).
Sahinalp S, Vishkin U. On a parallel-algorithms method for string matching problems (overview). In: Bonuccelli M, Crescenzi P, Petreschi R, editors. Algorithms and ComplexityAlgorithms and Complexity. Vol 778. Springer Berlin / Heidelberg; 1994. 2. p. 22-32p. (Lecture Notes in Computer Science; vol 778).
Bansal N, Korula N, Nagarajan V, Srinivasan A. On k-Column Sparse Packing Programs. In: Eisenbrand F, Shepherd F, editors. Integer Programming and Combinatorial OptimizationInteger Programming and Combinatorial Optimization. Vol 6080. Springer Berlin / Heidelberg; 2010. 3. p. 369-382p. (Lecture Notes in Computer Science; vol 6080).
Dachman-Soled D. On Minimal Assumptions for Sender-Deniable Public Key Encryption. In: Krawczyk H, editor. Public-Key Cryptography – PKC 2014. Springer Berlin Heidelberg; 2014. 5. p. 574-591p. (Lecture Notes in Computer Science).
Powell D, Cukier M, Arlat J. On stratified sampling for high coverage estimations. In: Hlawiczka A, Silva J, Simoncini L, editors. Dependable Computing — EDCC-2. Vol 1150. Springer Berlin / Heidelberg; 1996. 3. p. 35-54p. (Lecture Notes in Computer Science; vol 1150).
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T. On the Black-Box Complexity of Optimally-Fair Coin Tossing. In: Ishai Y, editor. Theory of Cryptography. Springer Berlin Heidelberg; 2011. 4. p. 450-467p. (Lecture Notes in Computer Science).
Choi SG, Dachman-Soled D, Yung M. On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. In: Visconti I, De Prisco R, editors. Security and Cryptography for Networks. Springer Berlin Heidelberg; 2012. 2. p. 264-280p. (Lecture Notes in Computer Science).
Au T-, Muñoz-Avila H, Nau DS. On the Complexity of Plan Adaptation by Derivational Analogy in a Universal Classical Planning Framework. In: Craw S, Preece A, editors. Advances in Case-Based Reasoning. Vol 2416. Springer Berlin / Heidelberg; 2002. 1. p. 199-206p. (Lecture Notes in Computer Science; vol 2416).
Goodrich MT, Papamanthou C, Tamassia R. On the Cost of Persistence and Authentication in Skip Lists. In: Demetrescu C, editor. Experimental Algorithms. Springer Berlin Heidelberg; 2007. 9. p. 94-107p. (Lecture Notes in Computer Science).
Gupta A, Srinivasan A. On the Covering Steiner Problem. In: Pandya P, Radhakrishnan J, editors. FST TCS 2003: Foundations of Software Technology and Theoretical Computer ScienceFST TCS 2003: Foundations of Software Technology and Theoretical Computer Science. Vol 2914. Springer Berlin / Heidelberg; 2003. 2. p. 244-251p. (Lecture Notes in Computer Science; vol 2914).
Monahemi M, Barlow J, O'Leary DP. On the Precise Loop Transfer Recovery and Transmission Zeroes. In: First IEEE Conference on Control ApplicationsFirst IEEE Conference on Control Applications. Dayton, Ohio; 1992.
Papamanthou C, Tamassia R, Triandopoulos N. Optimal Authenticated Data Structures with Multilinear Forms. In: Joye M, Miyaji A, Otsuka A, editors. Pairing-Based Cryptography - Pairing 2010. Springer Berlin Heidelberg; 2010. 2. p. 246-264p. (Lecture Notes in Computer Science).
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H. Optimal Cryptographic Hardness of Learning Monotone Functions. In: Aceto L, Damgård I, Goldberg LAnn, Halldórsson MM, Ingólfsdóttir A, Walukiewicz I, editors. Automata, Languages and Programming. Springer Berlin Heidelberg; 2008. 3. p. 36-47p. (Lecture Notes in Computer Science).
Papamanthou C, Tamassia R, Triandopoulos N. Optimal Verification of Operations on Dynamic Sets. In: Rogaway P, editor. Advances in Cryptology – CRYPTO 2011. Springer Berlin Heidelberg; 2011. 9. p. 91-110p. (Lecture Notes in Computer Science).
Card SK, Mackinlay JD, Shneiderman B. Overview+ detail. In: Readings in information visualizationReadings in information visualization.; 1999. 2. p. 285-286p.
Kamara S, Papamanthou C. Parallel and Dynamic Searchable Symmetric Encryption. In: Sadeghi A-R, editor. Financial Cryptography and Data Security. Springer Berlin Heidelberg; 2013. 2. p. 258-274p. (Lecture Notes in Computer Science).
Papamanthou C, Tollis IG. Parameterized st-Orientations of Graphs: Algorithms and Experiments. In: Kaufmann M, Wagner D, editors. Graph Drawing. Springer Berlin Heidelberg; 2007. 2. p. 220-233p. (Lecture Notes in Computer Science).
Reggia JA, D'Autrechy CL. Parsimonious covering theory in cognitive diagnosis and adaptive instruction. In: Diagnostic Monitoring of Skill and Knowledge AcquisitionDiagnostic Monitoring of Skill and Knowledge Acquisition. Psychology Press; 1990. 5. p. 510.
Chellappa R, Veeraraghavan A, Aggarwal G. Pattern Recognition in Video. In: Pal S, Bandyopadhyay S, Biswas S, editors. Pattern Recognition and Machine IntelligencePattern Recognition and Machine Intelligence. Vol 3776. Springer Berlin / Heidelberg; 2005. 1. p. 11-20p. (Lecture Notes in Computer Science; vol 3776).
Jacobs DW. Perceptual Completion and Memory. In: Perceptual organization in vision: behavioral and neural perspectivesPerceptual organization in vision: behavioral and neural perspectives.; 2003. 4. p. 403.
Jacobs DW. Perceptual organization as generic object recognition. In: and Kellman T S PFJ, editor. From Fragments to Objects Segmentation and Grouping in VisionFrom Fragments to Objects Segmentation and Grouping in Vision. Vol Volume 130. North-Holland; 2001. 2. p. 295-329p.
Dunlavy DM, Conroy JM, Schlesinger JD, Goodman SA, Okurowski M, O'Leary DP, et al. Performance of a Three-Stage System for Multi-Document Summarization. In: DUC 03 Conference ProceedingsDUC 03 Conference Proceedings. U.S. National Inst. of Standards and Technology; 2003.
Yaman F, Adali S, Nau DS, Sapino M, Subrahmanian V. Plan Databases: Model and Algebra. In: Seipel D, Turull-Torres J, editors. Foundations of Information and Knowledge Systems. Vol 2942. Springer Berlin / Heidelberg; 2004. 3. p. 302-319p. (Lecture Notes in Computer Science; vol 2942).
Au T-, Kuter U, Nau DS. Planning for Interactions among Autonomous Agents. In: Hindriks K, Pokahr A, Sardina S, editors. Programming Multi-Agent Systems. Vol 5442. Springer Berlin / Heidelberg; 2009. 1. p. 1-23p. (Lecture Notes in Computer Science; vol 5442).
Dix J, Kuter U, Nau DS. Planning in Answer Set Programming Using Ordered Task Decomposition. In: Günter A, Kruse R, Neumann B, editors. KI 2003: Advances in Artificial Intelligence. Vol 2821. Springer Berlin / Heidelberg; 2003. 4. p. 490-504p. (Lecture Notes in Computer Science; vol 2821).
Neumann J, Fermüller C, Aloimonos Y. Polydioptric Cameras: New Eyes for Structure from Motion. In: Van Gool L, editor. Pattern RecognitionPattern Recognition. Vol 2449. Springer Berlin / Heidelberg; 2002. 6. p. 618-625p. (Lecture Notes in Computer Science; vol 2449).
Hannenhalli S. Polynomial-time algorithm for computing translocation distance between genomes. In: Galil Z, Ukkonen E, editors. Combinatorial Pattern MatchingCombinatorial Pattern Matching. Vol 937. Springer Berlin / Heidelberg; 1995. 1. p. 162-176p. (Lecture Notes in Computer Science; vol 937).
Yue Z, Zhao W, Chellappa R. Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. In: Zhao W, Gong S, Tang X, editors. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. Vol 3723. Springer Berlin / Heidelberg; 2005. 2. p. 229-243p. (Lecture Notes in Computer Science; vol 3723).
Vishkin U. PRAM-On-Chip: A Quest for Not-So-Obvious Non-obviousness. In: Fiala J, Koubek V, Kratochvíl J, editors. Mathematical Foundations of Computer Science 2004Mathematical Foundations of Computer Science 2004. Vol 3153. Springer Berlin / Heidelberg; 2004. 1. p. 104-105p. (Lecture Notes in Computer Science; vol 3153).
Deshpande A. PrDB: Managing Large-Scale Correlated Probabilistic Databases (Abstract). In: Godo L, Pugliese A, editors. Scalable Uncertainty ManagementScalable Uncertainty Management. Vol 5785. Springer Berlin / Heidelberg; 2009. 1. p. 1. (Lecture Notes in Computer Science; vol 5785).
Shen E, Elaine Shi, Waters B. Predicate Privacy in Encryption Systems. In: Reingold O, editor. Theory of Cryptography. Vol 5444. Springer Berlin / Heidelberg; 2009. 4. p. 457-473p. (Lecture Notes in Computer Science; vol 5444).
Wang L, Deshpande A. Predictive Modeling-Based Data Collection in Wireless Sensor Networks. In: Verdone R, editor. Wireless Sensor NetworksWireless Sensor Networks. Vol 4913. Springer Berlin / Heidelberg; 2008. 3. p. 34-51p. (Lecture Notes in Computer Science; vol 4913).
Hombsek K, Bederson BB, Plaisant C. Preserving Context with Zoomable User Interfaces. In: The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. Morgan Kaufmann Publishers Inc.; 2003. 8. p. 83.

Pages