Publications

Export 3364 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
Reports
Mount D, Silverman R.  1998.  Minimum Enclosures with Specified Angles. CS-TR-3219
Ackermann C, Ray A, Cleaveland R, Heit J, Martin C, Shelton C.  2008.  Model Based Design Verification: A Monitor Based Approach. 2008-01-0741
Agrawala AK, Sanghi D.  1991.  Modeling of cross traffic in conjunction with deterministic analysis of queues.
Kustanowitz J, Shneiderman B.  2004.  Motivating annotation for digital photographs: Lowering barriers while raising incentives. HCIL-2004-18.
Atallah GC, Ball MO, Baras JS, Goli SK, Karne RK, Kelley S, Kumar HP, Plaisant C, Roussopoulos N, Shneiderman B et al..  1994.  Next Generation Network Management Technology. Institute for Systems Research Technical Reports.
Atallah GC, Ball MO, Baras JS, Goli SK, Karne RK, Kelley S, Kumar HP, Plaisant C, Roussopoulos N, Shneiderman B et al..  1994.  Next Generation Network Management Technology. Institute for Systems Research Technical Reports.
Atallah GC, Ball MO, Baras JS, Goli SK, Karne RK, Kelley S, Kumar HP, Plaisant C, Roussopoulos N, Shneiderman B et al..  1994.  Next Generation Network Management Technology. Institute for Systems Research Technical Reports.
Aris A, Shneiderman B.  2008.  A Node Aggregation Strategy to Reduce Complexity of Network Visualization using Semantic Substrates.
Shi Q, JaJa JF.  2003.  An O(n)-Space O(log n/log log n + f)-Query Time Algorithm for 3-D Dominance Reporting. UMIACS-TR-2003-77
V.S. Subrahmanian.  2003.  Optimizing Heavily Loaded Agents.
Bederson BB, Shneiderman B, Wattenberg M.  2005.  Ordered and Quantum Treemaps: Making Effective Use of 2D Space to Display Hierarchies (2001). Institute for Systems Research Technical Reports.
Stewart G.W.  1999.  On Orthogonalization in the Inverse Power Method. UMIACS-TR-99-64
Elaine Shi, Stoica I, Andersen DG, Perrig A.  2006.  OverDoSe: A generic DDoS protection service using an overlay network.
Elaine Shi, Stoica I, Andersen DG, Perrig A.  2006.  OverDoSe: A generic DDoS protection service using an overlay network.
JaJa JF, Shi Q, Varshney A.  2008.  Parallel Algorithms for Volumetric Surface Construction.
Elman H, Howle VE, Shadid J, Tuminaro R.  2002.  A Parallel Block Multi-level Preconditioner for the 3D Incompressible Navier--Stokes Equations. UMIACS-TR-2002-95
Smorul M, JaJa JF, Wang Y, McCall F.  2004.  PAWN: Producer-Archive Workflow Network in support of digital preservation. UMIACS-TR-2004:2006-2006.
Stewart G.W.  1998.  On the Perturbation of LU, Cholesky, and QR Factorizations. UMIACS-TR-92-24
Stewart G.W.  1995.  On the perturbation of Schur complement in positive semidefinite matrix. TR-95-38
Stewart G.W.  1998.  Perturbation Theory for the Singular Value Decomposition. UMIACS-TR-90-124
Shneiderman B.  2005.  Promoting Universal Usability with Multi-Layer Interface Design (2003). Institute for Systems Research Technical Reports.
Stewart G.W.  1998.  QR Sometimes Beats Jacobi. UMIACS-TR-95-32
Wongsuphasawat K, Plaisant C, Shneiderman B.  2009.  Querying timestamped event sequences by exact search or similarity-based search: design and empirical evaluation. HCIL-2009-20
Elaine Shi, Lu Y, Reid M.  2005.  Recovering from Intrusions in the OSPF Data-plane. Selected Project Reports, Spring 2005 Advanced OS & Distributed Systems (15-712).
Smorul M, JaJa JF, McCall F, Brown S F, Moore R, Marciano R, Chen S-Y, Lopez R, Chadduck R.  2003.  Recovery of a Digital Image Collection Through the SDSC/UMD/NARA Prototype Persistent Archive. UMIACS-TR-2003-105

Pages