Group Signatures Mean Privacy
March 29, 2004 - Breno De MedeirosSearching for 3D Models
March 26, 2004 - Michael KazhdanAlgorithmic Game Theory and Internet Computing
March 25, 2004 - Amin Saberi, Georgia Institute of TechnologyUnified Cellular and Ad-Hoc Network: Architecture and Protocols
March 23, 2004 - Haiyun LuoSupervised Peer-to-Peer Overlay Networks
March 12, 2004 - Chris RileyOrigin Authentication in Interdomain Routing
March 11, 2004 - Patrick McDaniel, AT&T LabsThe All-or-Nothing Multicommodity Flow and Related Problems
March 9, 2004 - Chandra ChekuriCooperative Bug Isolation
March 8, 2004 - Benjamin LiblitThe Hardness of Metric Labeling
March 5, 2004 - Julia ChuzhoyEnabling Effective Trust Judgments
March 4, 2004 - Sean Smith, Dartmouth CollegeApproximating metrics by simpler metrics: Why and how?
March 3, 2004 - Konal TalwarNew Tools for Camera Networks through a Unification of Multiple View Geometry and Harmonic Analysis
March 1, 2004 - Christopher GeyerBuilding a Secure and Resilient Network Infrastructure
February 26, 2004 - Daniel MasseyPursuit-Evasion With Visibility
February 20, 2004 - Volkan IslerOn Selfish Routing in Internet-like Environments
February 13, 2004 - Lili QiuPublic-Key Encryption in a Multi-User Setting: Privacy, Anonymity and Efficiency.
February 5, 2004 - Alexandra Boldyreva, University of California, San Diego