Publications
Export 1734 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is M [Clear All Filters]
2008. Combining Classifiers with Informational Confidence. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :163-192.
2002. On the Complexity of Plan Adaptation by Derivational Analogy in a Universal Classical Planning Framework. Advances in Case-Based Reasoning. 2416:199-206.
1997. Comprehension and object recognition capabilities for presentations of simultaneous video key frame surrogates. Research and Advanced Technology for Digital LibrariesResearch and Advanced Technology for Digital Libraries. 1324:41-54.
2010. Compressive Acquisition of Dynamic Scenes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6311:129-142.
1991. Considerations on Loop Transfer Recovery for Non-minimum Phase Plants. Proceedings of the AIAA Aircraft Design Systems and Operations MeetingProceedings of the AIAA Aircraft Design Systems and Operations Meeting. AIAA-91-3086
2003. Data structures for 3D Multi-Tessellations: an overview. Data Visualization: The State of the ArtData Visualization: The State of the Art. :239-256.
2007. Deductive Databases. Wiley Encyclopedia of Computer Science and EngineeringWiley Encyclopedia of Computer Science and Engineering.
1991. The Design of Reduced Order Luenberger Observers with Precise LTR. Proceedings of the AIAA Meeting on Guidance, Navigation and ControlProceedings of the AIAA Meeting on Guidance, Navigation and Control. AIAA-91-2731
2007. Distributed Ranked Search. High Performance Computing – HiPC 2007High Performance Computing – HiPC 2007. 4873:7-20.
1999. Dynamic queries. Readings in information visualizationReadings in information visualization. :235-235.
2008. Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
2012. Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
2009. Efficient Robust Private Set Intersection. Applied Cryptography and Network Security. :125-142.
2008. Energy Efficient Monitoring in Sensor Networks. LATIN 2008: Theoretical InformaticsLATIN 2008: Theoretical Informatics. 4957:436-448.
2009. Enhancing Testing Technologies for Globalization of Software Engineering and Productivity. Handbook of Research on Software Engineering and Productivity Technologies: Implications of GlobalizationHandbook of Research on Software Engineering and Productivity Technologies: Implications of Globalization. :49-49.
2002. Error-Tolerant Agents. Computational Logic: Logic Programming and BeyondComputational Logic: Logic Programming and Beyond. 2407:83-104.
2010. Evolutionary framework for Lepidoptera model systems. Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera. :1-24.
2010. Evolutionary framework for Lepidoptera model systems. Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera. :1-24.
2008. Expanding the reach of Grid computing: combining Globus- and BOINC-based systems. Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology. :71-85.
2001. Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry. Algorithm EngineeringAlgorithm Engineering. 2141:172-184.