81. A Secure PLAN Hicks, Michael W.; Keromytis, Angelos D.; Smith, Jonathan M. 2003 Articles Computer science
83. A Secure PLAN (Extended Version) Hicks, Michael; Keromytis, Angelos D.; Smith, Jonathan M. 2002 Articles Computer science
84. Associated Polynomials and Uniform Methods for the Solution of Linear Problems Traub, Joseph F. 1966 Articles MathematicsPolynomials--Study and teachingLinear complementarity problem
85. ASSURE: Automatic Software Self-healing Using Rescue Points Sidiroglou, Stelios; Laadan, Oren; Perez, Carlos R.; Viennot, Nicolas; Nieh, Jason; Keromytis, Angelos D. 2009 Articles Computer science
86. A Study of Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D. 2007 Articles Computer science
87. A Study of the Relative Costs of Network Security Protocols Miltchev, Stefan; Ioannidis, Sotiris; Keromytis, Angelos D. 2002 Articles Computer science
88. A survey of sensor planning in computer vision Tarabanis, Konstantinos; Allen, Peter K.; Tsai, Roger Y. 1995 Articles Robotics
90. Asymptotic behavior of vector recurrences with applications Feldstein, Alan; Traub, Joseph F. 1977 Articles Computer scienceVector analysis--Computer programsRecursive programmingIterative methods (Mathematics)Differential equations, Nonlinear--Asymptotic theory
91. Asynchronous Policy Evaluation and Enforcement Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Articles Computer science
92. A system for programming and controlling a multisensor robotic hand Allen, Peter K.; Michelman, Paul; Roberts, Kenneth S. 1990 Articles Robotics
93. A Technical Word- and Term-Translation Aid Using Noisy Parallel Corpora across Language Groups Fung, Pascale; McKeown, Kathleen 1997 Articles Computer scienceInformation technology
95. A Three-State Algorithm for Real Polynomials Using Quadratic Iteration Jenkins, M.A.; Traub, Joseph F. 1970 Articles MathematicsIterative methods (Mathematics)Polynomials--Study and teaching
96. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
97. Authentication on Untrusted Remote Hosts with Public-key Sudo Burnside, Matthew Spindel; Lu, Mack; Keromytis, Angelos D. 2008 Articles Computer science
98. Automated Intrusion Detection Methods Using NFR Lee, Wenke; Park, Christopher T.; Stolfo, Salvatore 1999 Articles Computer science
99. Automated model acquisition from range images with view planning Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
100. Automated sensor planning for robotic vision tasks Tarabanis, Kostantinos; Tsai, Roger Y.; Allen, Peter K. 1991 Articles Robotics