Publications

Search
Export 620 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
LaCount DJ, El-Sayed NM, Kaul S, Wanless D, Turner CMR, Donelson JE.  2001.  Analysis of a donor gene region for a variant surface glycoprotein and its expression site in African trypanosomes. Nucleic acids research. 29(10):2012-2012.
Teich J, Bhattacharyya SS.  2004.  Analysis of dataflow programs with interval-limited data-rates. Computer Systems: Architectures, Modeling, and Simulation. :507-518.
Falk J, Zebelein C, Keinert J, Haubelt C, Teich J, Bhattacharyya SS.  2011.  Analysis of SystemC actor networks for efficient synthesis. ACM Trans. Embed. Comput. Syst.. 10(2):18:1-18:34.
Tariq M, Zeitoun A, Valancius V, Feamster N, Ammar M.  2008.  Answering what-if deployment and configuration questions with wise. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :99-110.
Seymour J J, Tuzo J, desJardins M.  2011.  Ant Colony Optimization in a Changing Environment. 2011 AAAI Fall Symposium Series.
Trappe W, M. Wu, Liu KJR.  2002.  Anti-collusion codes: multi-user and multimedia perspectives. Image Processing. 2002. Proceedings. 2002 International Conference on. 2:II-149-II-152vol.2-II-149-II-152vol.2.
Trappe W, M. Wu, Wang ZJ, Liu KJR.  2003.  Anti-collusion fingerprinting for multimedia. Signal Processing, IEEE Transactions on. 51(4):1069-1087.
Wang ZJ, M. Wu, Zhao HV, Trappe W, Liu KJR.  2005.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. Image Processing, IEEE Transactions on. 14(6):804-821.
Wang ZJ, M. Wu, Trappe W, Liu KJR.  2003.  Anti-collusion of group-oriented fingerprinting. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 2:II-217-20vol.2-II-217-20vol.2.
Cárdenas SR, Tian J, Zelkowitz MV.  1992.  An application of decision theory for the evaluation of software prototypes. Journal of Systems and Software. 19(1):27-39.
Papamanthou C, Tollis IG.  2010.  Applications of Parameterized st-Orientations. Journal of Graph Algorithms and Applications. 14(2):337-365.
Papamanthou C, Tollis IG.  2006.  Applications of Parameterized st-Orientations in Graph Drawing Algorithms. Graph Drawing. :355-367.
Tanin E, Samet H.  2002.  APPOINT: an Approach for Peer-to-Peer Offloading the INTernet. Proceedings of the 2002 annual national conference on Digital government research. :1-7.
Algazi VR, Duda RO, Duraiswami R, Gumerov NA, Tang Z.  2002.  Approximating the head-related transfer function using simple geometric models of the head and torso. The Journal of the Acoustical Society of America. 112:2053-2053.
Khuller S, Thurimella R.  1993.  Approximation Algorithms for Graph Augmentation. Journal of Algorithms. 14(2):214-225.
Tahmoush D, Samet H.  2006.  Archimedes, an archive of medical images. American Medical Informatics Association 2006 Annual Symposium Proceedings Biomedical and Health Informatics: From Foundations to Applications to Policy, Washington, DC, DW Bates, JH Holmes, and G. Kuperman, editors.
Shneiderman B, Thomas G.  1982.  An architecture for automatic relational database sytem conversion. ACM Trans. Database Syst.. 7(2):235-257.
Varshavsky A, Chen MY, de Lara E, Froehlich J, Haehnel D, Hightower J, LaMarca A, Potter F, Sohn T, Tang K et al..  2005.  Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
Gopalan R, Turaga P, Chellappa R.  2010.  Articulation-Invariant Representation of Non-planar Shapes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6313:286-299.
Wu M, Taylor EM, Martin, M.P.  2005.  Assessment of STBLI DNS data and comparison against experiments. AIAA paper.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2011.  An assessment of systems and software engineering scholars and institutions (2003–2007 and 2004–2008). Journal of Systems and Software. 84(1):162-168.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2009.  An assessment of systems and software engineering scholars and institutions (2002–2006). Journal of Systems and Software. 82(8):1370-1373.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2008.  An assessment of systems and software engineering scholars and institutions (2001–2005). Journal of Systems and Software. 81(6):1059-1062.
Grube NE, Taylor EM, Martin, M.P.  2007.  Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198
Triandopoulos N, Goodrich MT, Papamanthou C, Tamassia R.  2008.  Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science. :80-96.

Pages