Publications

Export 337 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Anderson ML, Josyula DP, Okamoto YA, Perlis D.  2002.  Time-situated agency: Active logic and intention formation. in: Workshop on Cognitive Agents, 25th German Conference on Artificial Intelligence.
Roginsky J, Stewart G.W.  1998.  Time-Domain Extraction of Broad-Band Sources by Tikhonov-Phillips Regularization of Triangular Toeplitz Kernels*. UMIACS-TR-95-87
Coolahan Jr JE, Roussopoulos N.  1985.  A timed petri net methodolgoy for specifying real-time system timing requirements. International Workshop on Timed Petri Nets. :24-31.
Wallace DF, Anderson NS, Shneiderman B.  1987.  Time Stress Effects on Two Menu Selection Systems. Proceedings of the Human Factors and Ergonomics Society Annual MeetingProceedings of the Human Factors and Ergonomics Society Annual Meeting. 31(7):727-731.
Zhuolin Jiang, Li S-F, Gao D-F.  2006.  A Time Saving Method for Human Detection in Wide Angle Camera Images. Machine Learning and Cybernetics, 2006 International Conference on. :4029-4034.
Bullock SS, Brennen GK, O’Leary DP.  2005.  Time reversal and n-qubit canonical decompositions. Journal of Mathematical Physics. 46(6):062104-062104-19-062104-062104-19.
Gaitan M, Mayergoyz ID.  1987.  TIME PERTURBATION ANALYSIS FOR THE MOS SYSTEM. COMPEL: The International Journal for Computation and Mathematics in Electrical and Electronic Engineering. 6(2):77-83.
Aryangat S, Andrade H, Sussman A.  2004.  Time and space optimization for processing groups of multi-dimensional scientific queries. Proceedings of the 18th annual international conference on Supercomputing. :95-105.
Papamanthou C, Tamassia R.  2007.  Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Information and Communications Security. :1-15.
Golub GH, Hansen P C, O'Leary DP.  1999.  Tikhonov Regularization and Total Least Squares. SIAM Journal on Matrix Analysis and Applications. 21(1):185-194.
Haft DH, Selengut JD, Richter RA, Harkins D, Basu MK, Beck E.  2013.  TIGRFAMs and Genome Properties in 2013.. Nucleic Acids Res. 41(Database issue):D387-95.
Arya S, Mount D, Xia J.  2010.  Tight lower bounds for halfspace range searching. Proceedings of the 2010 annual symposium on Computational geometry. :29-37.
Alon N, Azar Y, Vishkin U.  1986.  Tight complexity bounds for parallel comparison sorting. 27th Annual Symposium on Foundations of Computer Science. :502-510.
Azar Y, Vishkin U.  1987.  Tight comparison bounds on the complexity of parallel sorting. SIAM J. Comput.. 16(3):458-464.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
Karlson AK, Bederson BB.  2007.  Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
Mundur P, Sood A, Simon R.  1998.  Threshold-based admission control for multi-class video-on-demand systems. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :154-160.
Katz J, Yung M.  2002.  Threshold cryptosystems based on factoring. Advances in Cryptology—ASIACRYPT 2002. :139-147.
Kundu K, Sessions C, desJardins M, Rheingans P.  2002.  Three-dimensional visualization of hierarchical task network plans. In Proceedings of the 3rd International NASA Workshop on Planning and Scheduling for.
Madabhushi R, Korman CE, Mayergoyz ID.  1996.  A three-dimensional MOSFET solver implementing the fixed point iteration technique. Solid-State Electronics. 39(1):147-157.
Kerr DC, Goldsman N, Mayergoyz ID.  1998.  Three-Dimensional Hydrodynamic Modeling of MOSFET Devices. VLSI Design. 6(1-4):261-265.
Ward NL, Challacombe JF, Janssen PH, Henrissat B, Coutinho PM, Wu M, Xie G, Haft DH, Sait M, Badger J et al..  2009.  Three genomes from the phylum Acidobacteria provide insight into the lifestyles of these microorganisms in soils.. Appl Environ Microbiol. 75(7):2046-56.
Seydou F, Duraiswami R, Seppanen T.  2003.  Three dimensional acoustic scattering from an M multilayered domain via an integral equation approach. Antennas and Propagation Society International Symposium, 2003. IEEE. 1:669-672vol.1-669-672vol.1.
Abd-Almageed W, Blace RE, Eltoweissy M.  2011.  Threat-Aware Clustering in Wireless Sensor Networks. IFIP Advances in Information and Communication Technology (AICT). 264(264):1-12.
Zelkowitz MV.  1975.  Third generation compiler design. Proceedings of the 1975 annual conference. :253-258.

Pages