1. 3-D model construction using range and image data Stamos, Ioannis; Allen, Peter K. 2000 Articles Computer science
2. A Comparison of Thin-Client Computing Architectures Nieh, Jason; Yang, S. Jae; Novik, Naomi 2000 Reports Computer science
3. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
4. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science
5. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
6. Anomaly Detection over Noisy Data Using Learned Probability Distributions Eskin, Eleazar 2000 Articles Computer science
7. Automatic Classification of Text Databases Through Query Probing Ipeirotis, Panagiotis G.; Gravano, Luis; Sahami, Mehran 2000 Reports Computer science
8. Client Certificate and Key Retrieval for IKE Bellovin, Steven Michael; Moskowitz, Robert G. 2000 Reports Computer science
9. Combining Microarray Expression Data and Phylogenetic Profiles to Learn Gene Functional Categories Using Support Vector Machines Pavlidis, Paul; Grundy, William Noble 2000 Reports Computer science
10. Combining Strategies for Extracting Relations from Text Collections Agichtein, Eugene; Eskin, Eleazar; Gravano, Luis 2000 Reports Computer science