Publications

Export 359 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Roussopoulos N, Mark L.  1985.  Schema manipulation in self-describing and self-documenting data models. International Journal of Parallel Programming. 14(1):1-28.
Roussopoulos N, Mark L.  1985.  SELF-DESCRIBING AND SELF-DOCUMENTING DATABASE SYSTEMS. Languages for automation. :275-275.
Roussopoulos N, Kotidis Y, Labrinidis A, Sismanis Y.  2003.  The Opsis project: materialized views for data warehouses and the web. Advances in Informatics. :64-81.
Roussopoulos N, Kang H.  1991.  A pipeline N-way join algorithm based on the 2-way semijoin program. IEEE Transactions on Knowledge and Data Engineering. 3(4):486-495.
Roussopoulos N, Bader C.  1985.  Dynamic access control for relational views.. INFO. SYST.. 10(3):361-369.
Roussopoulos N, Mark L.  1984.  A framework for self-describing and self-documenting database systems. NBS Trends and Application Conference.
Roussopoulos N, Yeh RT.  1985.  SEES—A Software testing Environment Support System. IEEE Transactions on Software Engineering. SE-11(4):355-366.
Roussopoulos N, Kang H.  1986.  Principles and techniques in the design of ADMS+((advanced data-base management system)). Computer. 19:19-23.
Roussopoulos N.  1998.  Materialized views and data warehouses. ACM SIGMOD RecordSIGMOD Rec.. 27(1):21-26.
Roussopoulos N, Leifker D.  1984.  An introduction to PSQL: A pictorial structured query language. Proc. IEEE Workshop on Visual Languages. :77-87.
Roussopoulos N.  1986.  Engineering Information Systems: Builders and Designers Perspective. SIGMOD Conference. :1-3.
Roussopoulos N, Kelley S.  1984.  GDDT--A graphical design and documentation tool for software development. Computers & Graphics. 8(3):309-323.
Roussopoulos N, Mylopoulos J.  1975.  Using semantic networks for data base management. Proceedings of the 1st International Conference on Very Large Data Bases. :144-172.
Roussopoulos N, Economou N, Stamenas A.  1993.  ADMS: a testbed for incremental access methods. IEEE Transactions on Knowledge and Data Engineering. 5(5):762-774.
Rous B, Shneiderman B, Yankelovich N, Yoder E.  1989.  Lessons learned from the ACM hypertext on hypertext project. Proceedings of the second annual ACM conference on Hypertext. :385-386.
Rotman D, Vieweg S, Yardi S, Chi E, Preece J, Shneiderman B, Pirolli P, Glaisyer T.  2011.  From slacktivism to activism: participatory culture in the age of social media. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :819-822.
Rotman D, Preece J, Hammock J, Procita K, Hansen D, Parr C, Lewis D, Jacobs DW.  2012.  Dynamic changes in motivation in collaborative citizen-science projects. Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. :217-226.
Rosti AVI, Ayan NF, Xiang B, Matsoukas S, Schwartz R, Dorr BJ.  2007.  Combining outputs from multiple machine translation systems. Human Language Technologies 2007: The Conference of the North American Chapter of the Association for Computational Linguistics; Proceedings of the Main Conference. :228-235.
Ross DA, Hannenhalli S, Tobias JW, Cooch N, Shiekhattar R, Kadesch T.  2006.  Functional Analysis of Hes-1 in Preadipocytes. Molecular EndocrinologyMolecular Endocrinology. 20(3):698-705.
Ross R, V.S. Subrahmanian, Grant J.  2005.  Aggregate operators in probabilistic databases. J. ACM. 52(1):54-101.
Rosenzweig R, Bronner V, Zhang D, Fushman D, Glickman MH.  2012.  Rpn1 and Rpn2 coordinate ubiquitin processing factors at the proteasome. Journal of Biological ChemistryJ. Biol. Chem..
Rosenfeld SN, Rus I, Cukier M.  2007.  Archetypal behavior in computer security. Journal of Systems and Software. 80(10):1594-1606.
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. 1:178-188.
Rosenfeld A, Doermann D, DeMenthon D.  2003.  Video Mining.
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling and Simulation of the Escalation Archetype in Computer Security. Symposium on Simulation Software Security (SSSS 06). 38(2):495-495.

Pages