Publications

Export 620 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Last Name is T  [Clear All Filters]
2004
Tanin E, Harwood A, Samet H, Nutanong S, Truong M T.  2004.  A serverless 3D world. Proceedings of the 12th annual ACM international workshop on Geographic information systems. :157-165.
Boehm B, Brown AW, Basili VR, Turner R.  2004.  Spiral acquisition of software-intensive systems of systems. CrossTalk. :4-9.
Bambha NK, Bhattacharyya SS, Teich J, Zitzler E.  2004.  Systematic Integration of Parameterized Local Search Techniques in Evolutionary Algorithms. Genetic and Evolutionary Computation–GECCO 2004. :383-384.
Verma R, Peters NR, D'Onofrio M, Tochtrop GP, Sakamoto KM, Varadan R, Zhang M, Coffino P, Fushman D, Deshaies RJ et al..  2004.  Ubistatins Inhibit Proteasome-Dependent Degradation by Binding the Ubiquitin Chain. Science. 306(5693):117-120.
Tikir MM, Hollingsworth J.  2004.  Using Hardware Counters to Automatically Improve Memory Performance. Proceedings of the 2004 ACM/IEEE conference on Supercomputing. :46–-46–.
Islam MS, Talukder KA, Khan NH, Mahmud ZH, Rahman MZ, Nair GB, Siddique AKM, Yunus M, Sack DA, Sack RB et al..  2004.  Variation of toxigenic Vibrio cholerae O1 in the aquatic environment of Bangladesh and its correlation with the clinical strains. Microbiology and immunology. 48(10):773-777.
2005
Papamanthou C, Tollis IG, Doerr M.  2005.  3D Visualization of Semantic Metadata Models and Ontologies. Graph Drawing. :377-388.
Wang ZJ, M. Wu, Zhao HV, Trappe W, Liu KJR.  2005.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Image Processing, IEEE Transactions on. 14(6):804-821.
Varshavsky A, Chen MY, de Lara E, Froehlich J, Haehnel D, Hightower J, LaMarca A, Potter F, Sohn T, Tang K et al..  2005.  Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
Wu M, Taylor EM, Martin, M.P.  2005.  Assessment of STBLI DNS data and comparison against experiments. AIAA paper.
Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities. :10pp.-148-10pp.-148.
Gennaro R, Gertner Y, Katz J, Trevisan L.  2005.  Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing. 35(1):217-217.
Tanin E, Plaisant C, Shneiderman B.  2005.  Broadening Access to Large Online Databases by Generalizing Query Previews (2000). Institute for Systems Research Technical Reports.
Tanin E, Shneiderman B.  2005.  Browsing Large Online Data Tables Using Generalized Query Previews (2001). Institute for Systems Research Technical Reports.
Dix A, Jones W, Czerwinski M, Teevan J, Plaisant C, Moran TP.  2005.  The Challenge of Personal Information Management. INTERACT'05: Communicating Naturally through Computers (Adjunct Proceedings).
Wang ZJ, Wu M, Zhao HV, Trappe W, Liu KJR.  2005.  Collusion resistance analysis of multimedia fingerprinting systems. IEEE Tran. on Image Processing.
El-Sayed NM, Myler PJ, Blandin G, Berriman M, Crabtree J, Aggarwal G, Caler E, Renauld H, Worthey EA, Hertz-Fowler C et al..  2005.  Comparative Genomics of Trypanosomatid Parasitic Protozoa. Science. 309(5733):404-409.
Tabatabaee V, Bhattacharjee B, La RJ, Shayman MA.  2005.  Differentiated traffic engineering for QoS provisioning. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 4:2349-2359vol.4-2349-2359vol.4.
Tanin E, Harwood A, Samet H.  2005.  A distributed quadtree index for peer-to-peer settings. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING. 21:254-254.
Tang L, Shneiderman B.  2005.  Dynamic Aggregation to Support Pattern Discovery: A Case Study with Web Logs (2001). Institute for Systems Research Technical Reports.
Hicks MW, Tse S, Hicks B, Zdancewic S.  2005.  Dynamic updating of information-flow policies. Proceedings of the International Workshop on Foundations of Computer Security (FCS).
Tanin E, Nayar D, Samet H.  2005.  An efficient nearest neighbor algorithm for P2P settings. Proceedings of the 2005 national conference on Digital government research. :21-28.
Tikir MM, Hollingsworth J.  2005.  Efficient online computation of statement coverage. Journal of Systems and Software. 78(2):146-165.
Laskowski S, Plaisant C.  2005.  Evaluation Methodologies for Visual Analytics. Illuminating the Path: The Research and Development Agenda for Visual AnalyticsIlluminating the Path: The Research and Development Agenda for Visual Analytics. :150-157.
Lindvall M, Rus I, Shull F, Zelkowitz MV, Donzelli P, Memon AM, Basili VR, Costa P, Tvedt R, Hochstein L.  2005.  An evolutionary testbed for software technology evaluation. Innovations in Systems and Software Engineering. 1(1):3-11.

Pages