1. 3-D model construction using range and image data Stamos, Ioannis; Allen, Peter K. 2000 Articles Computer science
2. A Comparison of Thin-Client Computing Architectures Nieh, Jason; Yang, S. Jae; Novik, Naomi 2000 Reports Computer science
3. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
4. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science
5. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
6. Anomaly Detection over Noisy Data Using Learned Probability Distributions Eskin, Eleazar 2000 Articles Computer science
7. Automatic Classification of Text Databases Through Query Probing Ipeirotis, Panagiotis G.; Gravano, Luis; Sahami, Mehran 2000 Reports Computer science
8. Client Certificate and Key Retrieval for IKE Bellovin, Steven Michael; Moskowitz, Robert G. 2000 Reports Computer science
9. Combining Microarray Expression Data and Phylogenetic Profiles to Learn Gene Functional Categories Using Support Vector Machines Pavlidis, Paul; Grundy, William Noble 2000 Reports Computer science
10. Combining Strategies for Extracting Relations from Text Collections Agichtein, Eugene; Eskin, Eleazar; Gravano, Luis 2000 Reports Computer science
11. Computing Geographical Scopes of Web Resources Ding, Junyan; Gravano, Luis; Shivakumar, Narayanan 2000 Reports Computer science
12. Constraint-based sensor planning for scene modeling Reed, Michael K.; Allen, Peter K. 2000 Articles Computer science
13. Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project Stolfo, Salvatore; Fan, Wei; Lee, Wenke; Prodromidis, Andreas L.; Chan, Philip K. 2000 Articles Computer science
14. DEFINDER: Rule-Based Methods for the Extraction of Medical Terminology and their Associated Definitions from On-line Text Klavans, Judith L.; Muresan, Smaranda 2000 Presentations (Communicative Events) Computer scienceInformation technology
15. Design, architecture and control of a mobile site-modeling robot Georgiev, Atanas; Allen, Peter K.; Gold, Ed; Blaer, Paul S. 2000 Articles Robotics
16. Document Processing with LinkIT Klavans, Judith L.; Evans, David K.; Wacholder, Nina 2000 Presentations (Communicative Events) Computer scienceInformation technology
17. Evaluation of automatically identified index terms for browsing electronic documents Klavans, Judith L.; Evans, David K.; Wacholder, Nina 2000 Presentations (Communicative Events) Computer scienceInformation technology
18. Evaluation of computational linguistic techniques for identifying significant topics for browsing applications Klavans, Judith L.; Evans, David K.; Wacholder, Nina 2000 Presentations (Communicative Events) Computer scienceInformation technology
19. Experiments in automated lexicon building for text searching Schiffman, Barry; McKeown, Kathleen 2000 Presentations (Communicative Events) Information technologyComputer science
20. Generating Referring Quantified Expressions McKeown, Kathleen; Shaw, James 2000 Presentations (Communicative Events) Information technologyComputer science