Journal Articles

Pages

Varna AL, Chuang WH, Wu M. A framework for theoretical analysis of content fingerprinting. Proc. of SPIE Media Forensics and Security. 2010.
Cleaveland R, Madelaine E, Sims S. A front-end generator for verification tools. Tools and Algorithms for the Construction and Analysis of Systems. 1995:153-173.
Srinivasan A. A Generalization of Brooks' Theorem. Computer Science Technical Reports. 1992.
Fredette AN, Cleaveland R. A generalized approach to real-time schedulability analysis. IEEE Real-Time Systems Newsletter. 1993;9(1-2):98-103.
Li B, Chellappa R. A generic approach to simultaneous tracking and verification in video. Image Processing, IEEE Transactions on. 2002;11(5):530-544.
Dodis Y, Franklin M, Katz J, Miyaji A, Yung M. A generic construction for intrusion-resilient public-key encryption. Topics in Cryptology–CT-RSA 2004. 2004:1997.
Chandra R, Lefever RM, Joshi KR, Cukier M, Sanders WH. A global-state-triggered fault injector for distributed system evaluation. Parallel and Distributed Systems, IEEE Transactions on. 2004;15(7):593-605.
Young D, Shneiderman B. A graphical filter/flow representation of Boolean queries: A prototype implementation and evaluation. Journal of the American Society for Information Science. 1993;44(6):327-339.
Gordon S, Katz J, Vaikuntanathan V. A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. 2010:395-412.
Neumann J, Fermüller C, Aloimonos Y. A hierarchy of cameras for 3D photography. Computer Vision and Image Understanding. 2004;96(3):274-293.
Elman H, Saad Y, Saylor PE. A Hybrid Chebyshev Krylov Subspace Algorithm for Solving Nonsymmetric Systems of Linear Equations. SIAM Journal on Scientific and Statistical ComputingSIAM J. Sci. and Stat. Comput.. 1986;7(3):840.
Mao Y, M. Wu. A joint signal processing and cryptographic approach to multimedia encryption. Image Processing, IEEE Transactions on. 2006;15(7):2061-2075.
Guerra-Filho G, Aloimonos Y. A Language for Human Action. Computer. 2007;40(5):42-51.
Adams G, Resnik P. A Language Identification Application Built on the Java Client/Server Platform. From Research to Commercial Applications: Making NLP Work in Practice. 1997:43-47.
Bhattacharya I, Getoor L. A latent dirichlet allocation model for entity resolution. 6th SIAM Conference on Data Mining (SDM), Bethesda, USA. 2006.
Gopalan R, Hong T, Shneier M, Chellappa R. A Learning Approach Towards Detection and Tracking of Lane Markings. IEEE Transactions on Intelligent Transportation Systems. 2010;PP(99):1-12.
Samet H, Filho G. A Linear Iterative Approach for Hierarchical Shortest Path Finding. Technical Reports from UMIACS, UMIACS-TR-2002-97. 2002.
Grant J, Kraus S, Perlis D. A logic for characterizing multiple bounded agents. Autonomous Agents and Multi-Agent Systems. 2000;3(4):351-387.
Grant J, Minker J. A logic-based approach to data integration. Theory Pract. Log. Program.. 2002;2(3):323-368.
Horak MN, Nowick SM, Carlberg M, Vishkin U. A Low-Overhead Asynchronous Interconnection Network for GALS Chip Multiprocessors. Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on. 2011;30(4):494-507.
Boutellier J, Bhattacharyya SS, Silvén O. A Low-overhead Scheduling Methodology for Fine-grained Acceleration of Signal Processing Systems. Journal of Signal Processing Systems. 2010;60(3):333-343.
Wang J, Hannenhalli S. A mammalian promoter model links cis elements to genetic networks. Biochemical and Biophysical Research Communications. 2006;347(1):166-177.
Cardenas-Garcia S, Zelkowitz MV. A management tool for evaluation of software design. Software Engineering, IEEE Transactions on. 1991;17(9):961-971.
Roy M, Arnaud J, Jasmin P, Hamner S, Hasan N, Colwell RR, et al. A Metagenomic Approach to Evaluating Surface Water Quality in Haiti. International Journal of Environmental Research and Public Health. 2018;1542(10):2211.
Licamele L, Getoor L. A method for the detection of meaningful and reproducible group signatures from gene expression profiles. Journal of Bioinformatics and Computational Biology. 2011;9(3):431-451.
Dorr BJ, Monz C, President S, Schwartz R, Zajic D. A methodology for extrinsic evaluation of text summarization: Does ROUGE correlate. Proceedings of the ACL Workshop on Intrinsic and Extrinsic Evaluation Measures for Machine Translation and/or Summarization. 2005:1-8.
Florescu D, Raschid L, Valduriez P. A methodology for query reformulation in CIS using semantic knowledge. International Journal of Cooperative Information Systems. 1996;5(4):431-468.
Bederson BB, Wallace RS, Schwartz EL. A miniature pan-tilt actuator: the spherical pointing motor. IEEE Transactions on Robotics and Automation. 1994;10(3):298-308.
Bederson BB, Wallace RS, Schwartz E. A miniaturized space-variant active vision system: Cortex-I. Machine Vision and applications. 1995;8(2):101-109.
Baker K, Bloodgood M, Dorr BJ, Filardo NW, Levin L, Piatko C. A modality lexicon and its use in automatic tagging. Proceedings of the Seventh conference on International Language Resources and Evaluation (LREC’10). 2010:1402-1407.
Korman CE, Adly AA, Mayergoyz ID, Rugkwamsook P. A model for magnetic aftereffect in the presence of time varying demagnetizing fields. Magnetics, IEEE Transactions on. 2000;36(5):3182-3184.
Shneiderman B. A model for optimizing indexed file structures. International Journal of Parallel Programming. 1974;3(1):91-101.
Feamster N, Winick J, Rexford J. A model of BGP routing for network engineering. SIGMETRICS Perform. Eval. Rev.. 2004;32(1):331-342.
Shneiderman B. A model programming environment. Advances in Human-Computer Interaction. 1985;1:105-132.

Pages