1. Variational Calculations of the 2³S State of Helium Traub, Joseph F. 1958 Articles Helium ionsElectron configurationChemistry--Mathematical models
2. Variational Calculations of Energy and Fine Structure for the 2³P State of Helium Traub, Joseph F. 1959 Articles ChemistryNumerical calculations--Data processingMicrophysics
3. On Lagrange-Hermite Interpolation Traub, Joseph F. 1964 Articles MathematicsInterpolation--Computer programs
4. Construction of Globally Convergent Iteration Functions for the Solution of Polynomial Equations Traub, Joseph F. 1965 Articles MathematicsIterative methods (Mathematics)ComputersPolynomials--Study and teaching
5. Generalized Sequences with Applications to the Discrete Calculus Traub, Joseph F. 1965 Articles MathematicsDiscretization (Mathematics)Sequences (Mathematics)
6. A Class of Globally Convergent Iterations for the Solution of Polynomial Equations Traub, Joseph F. 1966 Articles Iterative methods (Mathematics)Polynomials--Study and teachingComputer science
7. Associated Polynomials and Uniform Methods for the Solution of Linear Problems Traub, Joseph F. 1966 Articles MathematicsPolynomials--Study and teachingLinear complementarity problem
8. A Three-State Algorithm for Real Polynomials Using Quadratic Iteration Jenkins, M.A.; Traub, Joseph F. 1970 Articles MathematicsIterative methods (Mathematics)Polynomials--Study and teaching
9. Computational Complexity of Iterative Processes Traub, Joseph F. 1972 Articles Iterative methods (Mathematics)MathematicsComputational complexityComputer science
10. Optimal Order and Efficiency for Iterations with Two Evaluations Kung, H.T.; Traub, Josephe F. 1976 Articles Computational complexityComputer science--MathematicsComputer arithmeticIterative methods (Mathematics)Mathematical optimization--Computer programs
11. The Algebraic Theory of Matrix Polynomials Dennis Jr., J.E.; Traub, Joseph F.; Weber, R.P. 1976 Articles Computer science--MathematicsMatrices
12. Asymptotic behavior of vector recurrences with applications Feldstein, Alan; Traub, Joseph F. 1977 Articles Computer scienceVector analysis--Computer programsRecursive programmingIterative methods (Mathematics)Differential equations, Nonlinear--Asymptotic theory
13. Algorithms for Solvents of Matrix Polynomials Dennis Jr., J.E.; Traub, Joseph F.; Weber, R.P. 1978 Articles Computer science--MathematicsComputer algorithmsPolynomials--Mathematical modelsBernoulli polynomialsMatrices
14. Paraphrasing questions using given and new information McKeown, Kathleen 1983 Articles Computer science
15. Optimal Integration for Functions of Bounded Variation Traub, Joseph F.; Lee, D. 1985 Articles Computer science
16. Integrating Sensory Data for Object Recognition Tasks Allen, Peter K.; Bajcsy, Ruzena 1986 Articles Artificial intelligence
17. Language generation: Applications, issues, and approaches McKeown, Kathleen 1986 Articles Computer science
18. PATHALIAS, or, The Care and Feeding of Relative Addresses Honeyman, Peter; Bellovin, Steven Michael 1986 Articles Computer science
21. An integrated system for dextrous manipulation Allen, Peter K.; Michelman, Paul; Roberts, Kenneth S. 1989 Articles Robotics
22. Current research in robotics and automation: An intelligent grasping system Allen, Peter K.; Michelman, Paul; Roberts, Kenneth S. 1989 Articles Robotics
23. Haptic object recognition using a multi-fingered dextrous hand Allen, Peter K.; Roberts, Kenneth S. 1989 Articles RoboticsArtificial intelligence
24. Acquisition and interpretation of 3-D sensor data from touch Allen, Peter K.; Michelman, Paul 1990 Articles Robotics
25. Acquisition and interpretation of 3-D sensor data from touch Allen, Peter K.; Michelman, Paul 1990 Articles Robotics
26. A system for programming and controlling a multisensor robotic hand Allen, Peter K.; Michelman, Paul; Roberts, Kenneth S. 1990 Articles Robotics
27. Cooperative integration of vision and touch Allen, Peter K. 1990 Articles RoboticsArtificial intelligence
28. Issues in building intelligent grasping systems Allen, Peter K. 1990 Articles RoboticsArtificial intelligence
29. Mapping haptic exploratory procedures to multiple shape representations Allen, Peter K. 1990 Articles Robotics
30. Pseudo-Network Drivers and Virtual Networks Bellovin, Steven Michael 1990 Articles Computer science
31. Automated sensor planning for robotic vision tasks Tarabanis, Kostantinos; Tsai, Roger Y.; Allen, Peter K. 1991 Articles Robotics
32. Automating the generation of coordinated multimedia explanations McKeown, Kathleen; Feiner, Steven 1991 Articles Computer science
33. Hand-eye coordination for grasping moving objects Allen, Peter K.; Timcenko, Aleksandar; Yoshimi, Billibon; Michelman, Paul 1991 Articles Robotics
34. Limitations of the Kerberos Authentication System Bellovin, Steven Michael; Merritt, Michael 1991 Articles Computer science
35. Microcavity vacuum tube pressure sensor for robot tactile sensing White, R. C.; Allen, Peter K.; Jiang, J. C. 1991 Articles Robotics
36. Real-time visual servoing Allen, Peter K.; Yoshimi, Billibon; Timcenko, Aleksandar 1991 Articles Robotics
38. Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks Bellovin, Steven Michael; Merritt, Michael 1992 Articles Computer scienceComputer securityData encryption (Computer science)Public key cryptography
39. Sensor planning in an active robotic work cell Abrams, Steven; Allen, Peter K. 1992 Articles RoboticsArtificial intelligence
40. The Monte Carlo Algorithm With a Pseudorandom Generator Traub, Joseph F.; Wozniakowski, Henryk 1992 Articles Computer science
42. Trajectory filtering and prediction for automated tracking and grasping of a moving object Allen, Peter K.; Timcenko, Aleksandar; Yoshimi, Billibon; Michelman, Paul 1992 Articles Robotics
43. An Attack on the Interlock Protocol When Used for Authentication Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
44. Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
45. Automated tracking and grasping of a moving object with a robotic hand-eye system Allen, Peter K.; Timcenko, Aleksandar; Yoshimi, Billibon; Michelman, Paul 1993 Articles Robotics
46. Compliant manipulation with a dextrous robot hand Michelman, Paul; Allen, Peter K. 1993 Articles Robotics
47. Dynamic sensor planning Abrams, Steven; Allen, Peter K.; Tarabanis, Konstantinos A. 1993 Articles Robotics
48. Modeling dynamic uncertainty in robot motions Timcenko, Aleksandar; Allen, Peter K. 1993 Articles Robotics
50. Planning velocity profiles from task-level constraints and environment uncertainties Timcenko, Aleksandar; Allen, Peter K. 1993 Articles Robotics
52. A Programmable Plaintext Recognizer Wagner, David A.; Bellovin, Steven Michael 1994 Articles Computer science
53. Forming complex dextrous manipulations from task primitives Michelman, Paul; Allen, Peter K. 1994 Articles Robotics
54. Probability-driven motion planning for mobile robots Timcenko, Aleksandar; Allen, Peter K. 1994 Articles Robotics
55. Visual control of grasping and manipulation tasks Yoshimi, Billibon; Allen, Peter K. 1994 Articles Robotics
56. Alignment using an uncalibrated camera system Yoshimi, Billibon; Allen, Peter K. 1995 Articles Robotics
57. A survey of sensor planning in computer vision Tarabanis, Konstantinos; Allen, Peter K.; Tsai, Roger Y. 1995 Articles Robotics
58. CAD model acquisition using BSP trees Reed, Michael K.; Allen, Peter K.; Abrams, Steven 1995 Articles Computer science
59. Combining corpus and machine-readable dictionary data for building bilingual lexicons Klavans, Judith L.; Tzoukermann, Evelyne 1995 Articles Computer scienceInformation technology
60. Computing robust viewpoints with multi-constraints using tree annealing Yao, Yulin; Allen, Peter K. 1995 Articles Computer science
62. Swept volumes and their use in viewpoint computation in robot work-cells Abrams, Steven; Allen, Peter K. 1995 Articles Robotics
63. The Challenge of Spoken Language Systems: Research Directions for the Nineties McKeown, Kathleen; Cole, Ron; Hirschman, Lynette; Atlas, Les; Beckman, Mary; Biermann, Alan; Bush, Marcia; Clements, Mark; Cohen, Jordan; Garcia, Oscar; Hanson, Brian; Hermansky, Hynek; Levinson, Steve; Morgan, Nelson; Novick, David G.; Ostendorf, Mari; Oviatt, Sharon; Price, Patti; Silverman, Harvey; Spitz, Judy; Waibel, Alex; Weinstein, Clifford; Zahorian, Steve; Zue, Victor 1995 Articles Computer science
64. The MVP sensor planning system for robotic vision tasks Tarabanis, Konstantinos; Tsai, Roger Y.; Allen, Peter K. 1995 Articles Robotics
65. Using argumentation in text generation Elhadad, Michael 1995 Articles Computer scienceInformation technology
66. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science
67. A Better Key Schedule for DES-like Ciphers Blumenthal, Uri; Bellovin, Steven Michael 1996 Articles Computer science
68. A "Bump in the Stack" Encryptor for MS-DOS Systems Wagner, David A.; Bellovin, Steven Michael 1996 Articles Computer science
69. A DNS Filter and Switch for Packet-filtering Gateways Cheswick, Bill; Bellovin, Steven Michael 1996 Articles Computer science
70. Computing camera viewpoints in a robot work-cell Abrams, Steven; Allen, Peter K.; Tarabanis, Konstantinos A. 1996 Articles Robotics
71. Integration of vision and force sensors for grasping Allen, Peter K.; Miller, Andrew T.; Oh, Paul Y.; Leibowitz, Brian S. 1996 Articles Robotics
72. Lexical choice for complex noun phrases: Structure, modifiers, and determiners Elhadad, Michael 1996 Articles Computer science
73. Problem Areas for the IP Security Protocols Bellovin, Steven Michael 1996 Articles Computer science
74. Translating Collocations for Bilingual Lexicons: A Statistical Approach McKeown, Kathleen; Smadja, Frank; Hatzivassiloglou, Vasileios 1996 Articles Computer science
75. 3-D modeling from range imagery: an incremental method with a planning component Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
76. A robotic system for 3D model acquisition from multiple range images Reed, Michael K.; Allen, Peter K. 1997 Articles Robotics
77. A Technical Word- and Term-Translation Aid Using Noisy Parallel Corpora across Language Groups Fung, Pascale; McKeown, Kathleen 1997 Articles Computer scienceInformation technology
78. Automated model acquisition from range images with view planning Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
79. Floating constraints in lexical choice McKeown, Kathleen; Elhadad, Michael; Robin, Jacques 1997 Articles Computer science
80. Implementing IPsec Keromytis, Angelos D.; Ioannidis, John; Smith, Jonathan M. 1997 Articles Computer science
81. Integrating real-time vision and manipulation Yoshimi, Billibon; Allen, Peter K. 1997 Articles Robotics
82. Learning Patterns from Unix Process Execution Traces for Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K. 1997 Articles Computer scienceMachine learningIntrusion detection systems (Computer security)
83. Probable Plaintext Cryptanalysis of the IP Security Protocols Bellovin, Steven Michael 1997 Articles Computer science
84. The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce 1997 Articles Computer science
85. Using Tactile and Visual Sensing with a Robotic Hand Allen, Peter K.; Miller, Andrew T.; Oh, Paul Y.; Leibowitz, Brian S. 1997 Articles Robotics
86. A Secure Active Network Environment Architecture: Realization in SwitchWare Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
87. Columbia digital news project: an environment for briefing and search over multimedia information Aho, Alfred V.; Chang, Shih-Fu; McKeown, Kathleen; Radev, Dragomir R.; Smith, John R.; Zaman, Kazi A. 1998 Articles Computer science
88. Critical Infrastructures You Can Trust: Where Telecommunications Fits Schneider, Fred B.; Bellovin, Steven Michael; Inouye, Alan S. 1998 Articles Computer science
90. Data Mining Approaches for Intrusion Detection Lee, Wenke; Stolfo, Salvatore 1998 Articles Computer science
91. Design of a partitioned visual feedback controller Oh, Paul Y.; Allen, Peter K. 1998 Articles Robotics
92. Generating natural language summaries from multiple on-line sources McKeown, Kathleen; Radev, Dragomir R. 1998 Articles Computer science
93. Interactive sensor planning Stamos, Ioannis; Allen, Peter K. 1998 Articles Computer scienceCity planning
94. KeyNote: Trust Management for Public-Key Infrastructures Blaze, Matt; Feigenbaum, Joan; Keromytis, Angelos D. 1998 Articles Computer science
95. Mining Audit Data to Build Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1998 Articles Computer science
96. Registering, integrating, and building CAD models from range data Yang, Ruigang; Allen, Peter K. 1998 Articles Computer science
97. Safety and Security of Programmable Network Infrastructures Alexander, D. Scott; Arbaugh, William A.; Keromytis, Angelos D.; Smith, Jonathan M. 1998 Articles Computer science
98. The SwitchWare Active Network Architecture Alexander, D. Scott; Arbaugh, William A.; Hicks, Michael W.; Kakkar, Pankaj; Keromytis, Angelos D.; Moore, Jonathan T.; Gunter, Carl A.; Nettles, Scott M.; Smith, Jonathan M. 1998 Articles Computer science
99. A Continuous Model of Computation Traub, Joseph F. 1999 Articles Computer scienceTuring machinesPhysicsComputational complexity
100. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science