1. A Class of Globally Convergent Iterations for the Solution of Polynomial Equations Traub, Joseph F. 1966 Articles Iterative methods (Mathematics)Polynomials--Study and teachingComputer science
2. Computational Complexity of Iterative Processes Traub, Joseph F. 1972 Articles Iterative methods (Mathematics)MathematicsComputational complexityComputer science
3. Asymptotic behavior of vector recurrences with applications Feldstein, Alan; Traub, Joseph F. 1977 Articles Computer scienceVector analysis--Computer programsRecursive programmingIterative methods (Mathematics)Differential equations, Nonlinear--Asymptotic theory
4. Paraphrasing questions using given and new information McKeown, Kathleen 1983 Articles Computer science
5. Optimal Integration for Functions of Bounded Variation Traub, Joseph F.; Lee, D. 1985 Articles Computer science
6. Language generation: Applications, issues, and approaches McKeown, Kathleen 1986 Articles Computer science
7. PATHALIAS, or, The Care and Feeding of Relative Addresses Honeyman, Peter; Bellovin, Steven Michael 1986 Articles Computer science
9. Pseudo-Network Drivers and Virtual Networks Bellovin, Steven Michael 1990 Articles Computer science
10. Automating the generation of coordinated multimedia explanations McKeown, Kathleen; Feiner, Steven 1991 Articles Computer science
11. Limitations of the Kerberos Authentication System Bellovin, Steven Michael; Merritt, Michael 1991 Articles Computer science
13. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks Bellovin, Steven Michael; Merritt, Michael 1992 Articles Computer scienceComputer securityData encryption (Computer science)Public key cryptography
14. The Monte Carlo Algorithm With a Pseudorandom Generator Traub, Joseph F.; Wozniakowski, Henryk 1992 Articles Computer science
16. An Attack on the Interlock Protocol When Used for Authentication Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
17. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
19. A Programmable Plaintext Recognizer Wagner, David A.; Bellovin, Steven Michael 1994 Articles Computer science
20. CAD model acquisition using BSP trees Reed, Michael K.; Allen, Peter K.; Abrams, Steven 1995 Articles Computer science
21. Combining corpus and machine-readable dictionary data for building bilingual lexicons Klavans, Judith L.; Tzoukermann, Evelyne 1995 Articles Computer scienceInformation technology
22. Computing robust viewpoints with multi-constraints using tree annealing Yao, Yulin; Allen, Peter K. 1995 Articles Computer science
24. The Challenge of Spoken Language Systems: Research Directions for the Nineties McKeown, Kathleen; Cole, Ron; Hirschman, Lynette; Atlas, Les; Beckman, Mary; Biermann, Alan; Bush, Marcia; Clements, Mark; Cohen, Jordan; Garcia, Oscar; Hanson, Brian; Hermansky, Hynek; Levinson, Steve; Morgan, Nelson; Novick, David G.; Ostendorf, Mari; Oviatt, Sharon; Price, Patti; Silverman, Harvey; Spitz, Judy; Waibel, Alex; Weinstein, Clifford; Zahorian, Steve; Zue, Victor 1995 Articles Computer science
25. Using argumentation in text generation Elhadad, Michael 1995 Articles Computer scienceInformation technology
26. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science
27. A Better Key Schedule for DES-like Ciphers Blumenthal, Uri; Bellovin, Steven Michael 1996 Articles Computer science
28. A "Bump in the Stack" Encryptor for MS-DOS Systems Wagner, David A.; Bellovin, Steven Michael 1996 Articles Computer science
29. A DNS Filter and Switch for Packet-filtering Gateways Cheswick, Bill; Bellovin, Steven Michael 1996 Articles Computer science
30. Lexical choice for complex noun phrases: Structure, modifiers, and determiners Elhadad, Michael 1996 Articles Computer science
31. Problem Areas for the IP Security Protocols Bellovin, Steven Michael 1996 Articles Computer science
32. Translating Collocations for Bilingual Lexicons: A Statistical Approach McKeown, Kathleen; Smadja, Frank; Hatzivassiloglou, Vasileios 1996 Articles Computer science
33. 3-D modeling from range imagery: an incremental method with a planning component Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
34. A Technical Word- and Term-Translation Aid Using Noisy Parallel Corpora across Language Groups Fung, Pascale; McKeown, Kathleen 1997 Articles Computer scienceInformation technology
35. Automated model acquisition from range images with view planning Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
36. Floating constraints in lexical choice McKeown, Kathleen; Elhadad, Michael; Robin, Jacques 1997 Articles Computer science
37. Implementing IPsec Keromytis, Angelos D.; Ioannidis, John; Smith, Jonathan M. 1997 Articles Computer science
38. Learning Patterns from Unix Process Execution Traces for Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K. 1997 Articles Computer scienceMachine learningIntrusion detection systems (Computer security)
39. Probable Plaintext Cryptanalysis of the IP Security Protocols Bellovin, Steven Michael 1997 Articles Computer science
40. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce 1997 Articles Computer science
41. A Secure Active Network Environment Architecture: Realization in SwitchWare Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
42. Columbia digital news project: an environment for briefing and search over multimedia information Aho, Alfred V.; Chang, Shih-Fu; McKeown, Kathleen; Radev, Dragomir R.; Smith, John R.; Zaman, Kazi A. 1998 Articles Computer science
43. Critical Infrastructures You Can Trust: Where Telecommunications Fits Schneider, Fred B.; Bellovin, Steven Michael; Inouye, Alan S. 1998 Articles Computer science
45. Data Mining Approaches for Intrusion Detection Lee, Wenke; Stolfo, Salvatore 1998 Articles Computer science
46. Generating natural language summaries from multiple on-line sources McKeown, Kathleen; Radev, Dragomir R. 1998 Articles Computer science
47. Interactive sensor planning Stamos, Ioannis; Allen, Peter K. 1998 Articles Computer scienceCity planning
48. KeyNote: Trust Management for Public-Key Infrastructures Blaze, Matt; Feigenbaum, Joan; Keromytis, Angelos D. 1998 Articles Computer science
49. Mining Audit Data to Build Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1998 Articles Computer science
50. Registering, integrating, and building CAD models from range data Yang, Ruigang; Allen, Peter K. 1998 Articles Computer science