1. 3D modeling of historic sites using range and image data Allen, Peter K.; Stamos, Ioannis; Troccoli, Alejandro; Smith, Benjamin; Leordeanu, Marius; Hsu, Y. C. 2003 Articles Computer scienceArchitecture
3. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
4. A Bounded Field: Situating Victorian Poetry in the Literary Landscape Gray, Erik I. 2003 Articles Poetry
5. A case for a comet impact trigger for the Paleocene/Eocene thermal maximum and carbon isotope excursion Kent, Dennis V.; Cramer, B. S.; Lanci, L.; Wang, D.; Wright, J. D.; Van der Voo, R. 2003 Articles MeteorologyGeochemistryPaleoclimatology
7. Accelerating Application-Level Security Protocols Burnside, Matthew Spindel; Keromytis, Angelos D. 2003 Articles Computer science
8. Access Control Prefix Router Advertisement Option for IPv6 Bellovin, Steven Michael 2003 Reports Computer science
9. Achieving the Millennium Development Goals: Health in the Developing World Sachs, Jeffrey D. 2003 Presentations (Communicative Events) Public healthRegional planning
10. A Cooperative Immunization System for an Untrusting Internet Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D.; Li, Dekai 2003 Articles Computer science