Publications

Export 538 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is A  [Clear All Filters]
Conference Papers
Vishkin U.  2009.  Algorithmic approach to designing an easy-to-program system: Can it lead to a HW-enhanced programmer's workflow add-on? Computer Design, 2009. ICCD 2009. IEEE International Conference on. :60-63.
Kumar AVS, Marathe MV, Parthasarathy S, Srinivasan A.  2005.  Algorithmic aspects of capacity in wireless networks. Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :133-144.
Xu C, Gupta SK.  2004.  Algorithmic Foundations for Consistency-Checking of Interaction-States of Mechatronic Systems.
Demaine ED, Hajiaghayi MT, Kawarabayashi K.  2005.  Algorithmic graph minor theory: Decomposition, approximation, and coloring. Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on. :637-646.
Mount D, Silverman R.  1987.  Algorithms for covering and packing and applications to CAD/CAM (abstract only): preliminary results. Proceedings of the 15th annual conference on Computer Science. :439–-439–.
Charikar M, Khuller S, Mount D, Narasimhan G.  2001.  Algorithms for facility location problems with outliers. Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. :642-651.
Arya S, Mount D.  1993.  Algorithms for fast vector quantization. Data Compression Conference, 1993. DCC '93.. :381-390.
Peng T, Balijepalli A, Gupta SK, LeBrun TW.  2006.  Algorithms for on-line monitoring of components in an optical tweezers-based assembly cell. :1-13.
Wang T D, Plaisant C, Quinn AJ, Stanchak R, Murphy S, Shneiderman B.  2008.  Aligning temporal data by sentinel events: discovering patterns in electronic health records. Proceedings of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :457-466.
Ayan N F, Dorr BJ, Monz C.  2005.  Alignment link projection using transformation-based learning. Proceedings of the conference on Human Language Technology and Empirical Methods in Natural Language Processing. :185-192.
Han B, Ji L, Lee S, Bhattacharjee B, Miller RR.  2009.  All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors. INFOCOM 2009, IEEE. :1602-1610.
Barfourosh AA, Nezhad HRM, Anderson M, Perlis D.  2002.  ALLI: An Information Integration System Based on Active Logic Framework. Proceedings of the Third International Conference on Management Information Systems, Greece. :339-348.
Ahlberg C, Shneiderman B.  1994.  The alphaslider: a compact and rapid selector. Proceedings of the SIGCHI conference on Human factors in computing systems: celebrating interdependence. :365-371.
Yuan X, Memon AM.  2008.  Alternating GUI Test Generation and Execution. Practice and Research Techniques, 2008. TAIC PART '08. Testing: Academic Industrial Conference. :23-32.
Seligman M, Fall K, Mundur P.  2006.  Alternative custodians for congestion control in delay tolerant networks. Proceedings of the 2006 SIGCOMM workshop on Challenged networks. :229-236.
Kotidis Y, Roussopoulos N.  1998.  An alternative storage organization for ROLAP aggregate views based on cubetrees. ACM Sigmod Record. 27:249-258.
Zheng Y, Li H, Doermann D.  2003.  AModel-based Line Detection Algorithm in Documents. ICDAR. :44-48.
Kanungo T, Mount D, Netanyahu NS, Piatko C, Silverman R, Wu AY.  2000.  The analysis of a simple k-means clustering algorithm. Proceedings of the sixteenth annual symposium on Computational geometry. :100-109.
M. Wu, Craver S, Felten EW, Liu B.  2001.  Analysis of attacks on SDMI audio watermarks. Acoustics, Speech, and Signal Processing, 2001. Proceedings. (ICASSP '01). 2001 IEEE International Conference on. 3:1369-1372vol.3-1369-1372vol.3.
Condon E, He A, Cukier M.  2008.  Analysis of Computer Security Incident Data Using Time Series Models. :77-86.
Varna AL, He S, Swaminathan A, M. Wu.  2007.  Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 2:II-133-II-136-II-133-II-136.
Cleaveland R.  1993.  Analyzing concurrent systems using the Concurrency Workbench. Functional Programming, Concurrency, Simulation and Automated Reasoning. :129-144.
Basili VR, Zelkowitz MV.  1978.  Analyzing medium-scale software development. Proceedings of the 3rd international conference on Software engineering. :116-123.
Smith MA, Shneiderman B, Milic-Frayling N, Mendes Rodrigues E, Barash V, Dunne C, Capone T, Perer A, Gleave E.  2009.  Analyzing (social media) networks with NodeXL. Proceedings of the fourth international conference on Communities and technologies. :255-264.
Berthier R, Arjona J, Cukier M.  2009.  Analyzing the process of installing rogue software. :560-565.

Pages