Publications

Export 1734 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Book Chapters
Bolle R, Aloimonos Y, Fermüller C.  1996.  Video representations. Recent Developments in Computer Vision. 1035:33-41.
Massa P, Bhattacharjee B.  2004.  Using Trust in Recommender Systems: An Experimental Analysis. Trust ManagementTrust Management. 2995:221-235.
Lumezanu C, Baden R, Spring N, Bhattacharjee B.  2009.  Triangle Inequality and Routing Policy Violations in the Internet. Passive and Active Network MeasurementPassive and Active Network Measurement. 5448:45-54.
Nguyen H V, Banerjee A, Burlina P, Broadwater J, Chellappa R.  2011.  Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.
Dix J, Munoz-Avila H, Nau DS, Zhang L.  2002.  Theoretical and Empirical Aspects of a Planner in a Multi-agent Environment. Logics in Artificial Intelligence. 2424:173-185.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 3D+ time. Readings in information visualizationReadings in information visualization. :451-451.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 3D. Readings in information visualizationReadings in information visualization. :440-441.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 2D. Readings in information visualizationReadings in information visualization. :431-431.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Text in 1D. Readings in information visualizationReadings in information visualization. :411-412.
Memon AM.  2009.  TESTING EVENT-DRIVEN SOFTWARE–THE NEXT QA CHALLENGE? Software Engineering and DevelopmentSoftware Engineering and Development. :187-187.
O'Leary DP.  1995.  The SVD in Image Restoration. SVD and Signal Processing III: Algorithms, Architectures, and ApplicationsSVD and Signal Processing III: Algorithms, Architectures, and Applications. :315-322.
Kaâniche M, Kanoun K, Cukier M, Martini M.  1994.  Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2009.  Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Memon AM.  2005.  A process and role-based taxonomy of techniques to make testable COTS components. Testing Commercial-Off-The-Shelf Components And SystemsTesting Commercial-Off-The-Shelf Components And Systems. :109-140.
Udrea O, Yu D, Hung E, Subrahmanian V.  2005.  Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
Monahemi M, Barlow J, O'Leary DP.  1992.  On the Precise Loop Transfer Recovery and Transmission Zeroes. First IEEE Conference on Control ApplicationsFirst IEEE Conference on Control Applications.
Marchionini G, Plaisant C, Komlodi A.  2003.  The people in digital libraries: Multifaceted approaches to assessing needs and impact. Digital library use: Social practice in design and evaluationDigital library use: Social practice in design and evaluation. :119-160.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H.  2008.  Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
Papamanthou C, Tamassia R, Triandopoulos N.  2010.  Optimal Authenticated Data Structures with Multilinear Forms. Pairing-Based Cryptography - Pairing 2010. :246-264.
Mount D, Netanyahu NS, Ratanasanya S.  2010.  New Approaches to Robust, Point-Based Image Registration. Image Registration for Remote SensingImage Registration for Remote Sensing.
Hicks MW, Kakkar P, Moore J, Gunter C, Nettles S.  1999.  Network Programming Using PLAN. Internet Programming LanguagesInternet Programming Languages. 1686:127-143.
Rust BW, O'Leary DP, Mullen KM.  2010.  Modelling Type 1a Supernova Light Curves. Exponential Data Fitting and Its ApplicationsExponential Data Fitting and Its Applications. :169-186.

Pages