Publications

Export 292 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Wagner D, Foster JS, Brewer EA, Aiken A.  2000.  A first step towards automated detection of buffer overrun vulnerabilities. The 2000 Network and Distributed Systems Security Conference. San Diego, CA. 14
Bonsignore EM, Dunne C, Rotman D, Smith M, Capone T, Hansen DL, Shneiderman B.  2009.  First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. International Conference on Computational Science and Engineering, 2009. CSE '09. 4:332-339.
Haibin G A, Agarwal G, Ling H, Jacobs DW, Shirdhonkar S, Kress JW, Russell R, Belhumeur P, Dixit A, Feiner S et al..  2006.  First Steps Toward an Electronic Field Guide for Plants. Taxon. 55:597-610.
Shneiderman B.  1993.  First steps toward positive contributions. Communications of the ACM. 36(1):15-16.
Jordan PW, Dorr BJ, Benoit JW.  1993.  A first-pass approach for evaluating machine translation systems. Machine Translation. 8(1):49-58.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Fisheye views. Readings in information visualizationReadings in information visualization. :311-311.
Ramachandran A, Feamster N, Krishnamurthy B, Spatscheck O, Van der Merwe J.  2008.  Fishing for Phishing from the Network Stream. GT-CS-08-08
Bender A, Sherwood R, Spring N.  2008.  Fixing ally's growing pains with velocity modeling. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :337-342.
Pugh W.  1999.  Fixing the Java memory model. Proceedings of the ACM 1999 conference on Java Grande. :89-98.
Edu CU, Purang K, Purushothaman D, Traum D, Andersen C, Perlis D.  1999.  Fkpurang, darsana, traum, cfa, perlisg@ cs. umd. edu. In Proceedings of the IJCAI’99 Workshop on Practical Reasoning and Rationality.
Liang J, DeMenthon D, Doermann D.  2005.  Flattening curved documents in images. Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on. 2:338-345vol.2-338-345vol.2.
Varadarajan R, Hristidis V, Raschid L, Vidal ME, Ibá\ nez L, Rodríguez-Drumond H.  2009.  Flexible and efficient querying and ranking on hyperlinked data sources. Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. :553-564.
Li Z, Duraiswami R.  2007.  Flexible and Optimal Design of Spherical Microphone Arrays for Beamforming. Audio, Speech, and Language Processing, IEEE Transactions on. 15(2):702-714.
Wu J S-C, Sussman A.  2004.  Flexible Control of Data Transfers between Parallel Programs. Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing. :226-234.
Li Z, Duraiswami R, Grassi E, Davis LS.  2004.  Flexible layout and optimal cancellation of the orthonormality error for spherical microphone arrays. Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. 4:iv-41-iv-44vol.4-iv-41-iv-44vol.4.
Jajodia S, Samarati P, Sapino M L, V.S. Subrahmanian.  2001.  Flexible support for multiple access control policies. ACM Trans. Database Syst.. 26(2):214-260.
Balijepalli A, LeBrun TW, Gupta SK.  2006.  A flexible system framework for a nanoassembly cell using optical tweezers.
Deshpande A, Hellerstein L.  2008.  Flow Algorithms for Parallel Query Optimization. IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008. :754-763.
Condon A, Deshpande A, Hellerstein L, Wu N.  2006.  Flow algorithms for two pipelined filter ordering problems. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :193-202.
Van Horn D, Mairson HG.  2008.  Flow Analysis, Linearity, and PTIME. Static Analysis. :255-269.
Khuller S, Naor J.  1994.  Flow in planar graphs with vertex capacities. Algorithmica. 11(3):200-225.
Nassi I, Shneiderman B.  1973.  Flowchart techniques for structured programming. ACM SIGPLAN Notices. 8(8):12-26.
Consolvo S, Klasnja P, McDonald DW, Avrahami D, Froehlich J, LeGrand L, Libby R, Mosher K, Landay JA.  2008.  Flowers or a robot army?: encouraging awareness & activity with personal, mobile displays Proceedings of the 10th international conference on Ubiquitous computing. :54-63.
Foster JS, Johnson R, Kodumal J, Aiken A.  2006.  Flow-insensitive type qualifiers. ACM Transactions on Programming Languages and Systems (TOPLAS). 28(6):1035-1087.
Foster JS, Terauchi T, Aiken A.  2002.  Flow-sensitive type qualifiers. ACM SIGPLAN Notices. 37(5):1-12.

Pages