Publications

Export 624 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Conroy JM, O'Leary DP, Schlesinger JD.  2006.  CLASSYArabic and English Multi-Document Summarization. Multi-Lingual Summarization Evaluation 2006Multi-Lingual Summarization Evaluation 2006.
Conroy JM, Schlesinger JD, O'Leary DP.  2009.  CLASSY 2009: Summarization and Metrics. TAC 2009 Workshop ProceedingsTAC 2009 Workshop Proceedings.
Consolvo S, Harrison B, Smith I, Chen MY, Everitt K, Froehlich J, Landay JA.  2007.  Conducting In Situ Evaluations for and With Ubiquitous Computing Technologies. International Journal of Human-Computer Interaction. 22(1-2):103-118.
Cook D, Hicks G, Faber V, Marathe MV, Srinivasan A, Sussmann YJ, Thornquist H.  2000.  Combinatorial Problems Arising in Deregulated Electrical Power Industry: Survey and Future Directions. NONCONVEX OPTIMIZATION AND ITS APPLICATIONS. 42:138-162.
Corcoran BJ, Swamy N, Hicks MW.  2007.  Combining provenance and security policies in a web-based document management system. On-line Proceedings of the Workshop on Principles of Provenance (PrOPr).
Corcoran BJ, Swamy N, Hicks MW.  2009.  Cross-tier, label-based security enforcement for web applications. Proceedings of the 35th SIGMOD international conference on Management of data. :269-282.
Cormode G, Paterson M, Sahinalp S C, Vishkin U.  2000.  Communication complexity of document exchange. Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms. :197-206.
Corretjer I, Hsu C, Bhattacharyya SS.  2006.  Configuration and representation of large-scale dataflow graphs using the dataflow interchange format. Proceedings of the IEEE Workshop on Signal Processing Systems, Banff, Canada. :10-15.
Cukier M, Panjwani S.  2007.  A Comparison between Internal and External Malicious Traffic. :109-114.
Cukier M, Powell D, Ariat J.  1999.  Coverage estimation methods for stratified fault-injection. Computers, IEEE Transactions on. 48(7):707-723.
Cummings MP, Handley SA, Myers DS, Reed DL, Rokas A, Winka K.  2003.  Comparing bootstrap and posterior probability values in the four-taxon case. Syst Biol. 52(4):477-487.
Cummings MP.  1992.  Copia-like retrotransposons in plants: a brief introduction. The Plant Genetics Newsletter. 8(4):38-41.
Cuntoor NP, Chellappa R.  2007.  Coarse-to-Fine Event Model for Human Activities. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 1:I-813-I-816-I-813-I-816.
Cuntoor N, Kale A, Chellappa R.  2003.  Combining multiple evidences for gait recognition. Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on. 3:III-33-6vol.3-III-33-6vol.3.
D
Dachman-Soled D, Sreedhar V.C..  2007.  Configuration Reasoning and Ontology For Web. IEEE International Conference on Services Computing, 2007. SCC 2007. :387-394.
Dachman-Soled D, Gennaro R, Krawczyk H, Malkin T.  2012.  Computational Extractors and Pseudorandomness. Theory of Cryptography. :383-403.
Dachman-Soled D, Mahmoody M, Malkin T.  2014.  Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? Theory of Cryptography. :217-239.
Dachman-Soled D, Servedio RA.  2011.  A Canonical Form for Testing Boolean Function Properties. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :460-471.
Danovaro E, De Floriani L, Magillo P.  2002.  Compression methods for triangle meshes Preliminary version. DISI-02-XX
Danovaro E, De Floriani L, Puppo E, Samet H.  2005.  Clustering Techniques for Out-of-Core Multi-resolution Modeling. Visualization Conference, IEEE. :113-113.
Daumé H.  2008.  Cross-task knowledge-constrained self training. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :680-688.
De Floriani L, Panozzo D, Hui A.  2009.  Computing and visualizing a graph-based decomposition for non-manifold shapes. Graph-Based Representations in Pattern Recognition. :62-71.
Deligiannakis A, Kotidis Y, Roussopoulos N.  2004.  Compressing historical information in sensor networks. Proceedings of the 2004 ACM SIGMOD international conference on Management of data - SIGMOD '04. :527-527.
Demaine ED, Hajiaghayi MT, Feige U, Salavatipour MR.  2006.  Combination can be hard: Approximability of the unique coverage problem. Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm. :162-171.
Deshmukh AS, Banerjee A G, Gupta SK, Sriram RD.  2008.  Content-based assembly search: A step towards assembly reuse. Computer-Aided Design. 40(2):244-261.

Pages