Conference paperCombining lexical, syntactic, and semantic features with maximum entropy models for extracting relationsNanda KambhatlaACL 2004
PaperExposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicastGal Badishi, Idit Keidar, et al.IEEE TDSC
Conference paperModeling polarization for Hyper-NA lithography tools and masksKafai Lai, Alan E. Rosenbluth, et al.SPIE Advanced Lithography 2007