Publications

Export 1734 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is M  [Clear All Filters]
2008
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2008.  Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
McMaster S, Memon AM.  2008.  Call-Stack Coverage for GUI Test Suite Reduction. Software Engineering, IEEE Transactions on. 34(1):99-115.
McMaster S, Memon AM.  2008.  Call-Stack Coverage for GUI Test Suite Reduction. Software Engineering, IEEE Transactions on. 34(1):99-115.
Chafekar D, Levin D, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
Flach P, Matsubara ET, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  On classification, ranking, and probability estimation.
Flach P, Matsubara ET, De Raedt L, Dietterich T, Getoor L, Kersting K, Muggleton SH.  2008.  On classification, ranking, and probability estimation.
Jaeger S, Ma H, Doermann D.  2008.  Combining Classifiers with Informational Confidence. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :163-192.
Madnani N, Dorr BJ.  2008.  Combining open-source with research to re-engineer a hands-on introductory NLP course. Proceedings of the Third Workshop on Issues in Teaching Computational Linguistics. :71-79.
Cevher V, Gurbuz AC, McClellan JH, Chellappa R.  2008.  Compressive wireless arrays for bearing estimation. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :2497-2500.
Martinez V, Simari GI, Sliva A, V.S. Subrahmanian.  2008.  Computational cultural dynamics. IEEE intelligent systems. 23(4):51-57.
Mohammad S, Dorr BJ, Hirst G.  2008.  Computing word-pair antonymy. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :982-991.
Albanese M, Chellappa R, Moscato V, Picariello A, V.S. Subrahmanian, Turaga P, Udrea O.  2008.  A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
Gupta A, Mittal A, Davis LS.  2008.  Constraint Integration for Efficient Multiview Pose Estimation with Self-Occlusions. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(3):493-506.
Martinez V, Simari GI, Sliva A, V.S. Subrahmanian.  2008.  CONVEX: Similarity-Based Algorithms for Forecasting Group Behavior. Intelligent Systems, IEEE. 23(4):51-57.
Basili VR, Dangle K, Esker L, Marotta F, Rus I, Brosgol BM, Jamin S, Arthur JD, Ravichandar R, Wisnosky DE.  2008.  CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008.
Van Horn D, Mairson HG.  2008.  Deciding kCFA is Complete for EXPTIME. ICFP '08 Proceedings of the 13th ACM SIGPLAN International Conference on Functional Programming. :275-282.
Ananthanarayanan A, Bejgerowski W, Mueller D, Gupta SK.  2008.  Development of a multi-piece multi-gate mold for manufacturing a flapping wing drive-mechanism. Transactions of North American Manufacturing Research Institution of SME. 36
Mesmoudi M M, De Floriani L, Port U.  2008.  Discrete Distortion in Triangulated 3‐Manifolds. Computer Graphics Forum. 27(5):1333-1340.
Mathieu C, Papamanthou C.  2008.  Distortion lower bounds for line embeddings. Information Processing Letters. 108(4):175-178.
Ming R, Hou S, Feng Y, Yu Q, Dionne-Laporte A, Saw JH, Senin P, Wang W, Ly BV, Lewis KLT et al..  2008.  The draft genome of the transgenic tropical fruit tree papaya (Carica papaya Linnaeus). Nature. 452(7190):991-996.
Yoon I-C, Sussman A, Memon AM, Porter A.  2008.  Effective and scalable software compatibility testing. Proceedings of the 2008 international symposium on Software testing and analysis. :63-74.
Heitzmann A, Palazzi B, Papamanthou C, Tamassia R.  2008.  Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
Memarsadeghi N, Raykar VC, Duraiswami R, Mount D.  2008.  Efficient Kriging via Fast Matrix-Vector Products. Aerospace Conference, 2008 IEEE. :1-7.
Memarsadeghi N, Raykar VC, Duraiswami R, Mount D.  2008.  Efficient Kriging via Fast Matrix-Vector Products. Aerospace Conference, 2008 IEEE. :1-7.
Memarsadeghi N, Raykar VC, Duraiswami R, Mount D.  2008.  Efficient Kriging via Fast Matrix-Vector Products. Aerospace Conference, 2008 IEEE. :1-7.

Pages