Publications

Export 44 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is X  [Clear All Filters]
Journal Articles
Xu S, Martin, M.P.  2004.  Assessment of inflow boundary conditions for compressible turbulent boundary layers. Physics of Fluids. 16:2623-2623.
Memon AM, Nagarajan A, Xie Q.  2005.  Automating regression testing for evolving GUI software. Journal of Software Maintenance and Evolution: Research and Practice. 17(1):27-64.
Tanin E, Shneiderman B, Xie H.  2007.  Browsing large online data tables using generalized query previews. Information Systems. 32(3):402-423.
Rosti AVI, Ayan NF, Xiang B, Matsoukas S, Schwartz R, Dorr BJ.  2007.  Combining outputs from multiple machine translation systems. Human Language Technologies 2007: The Conference of the North American Chapter of the Association for Computational Linguistics; Proceedings of the Main Conference. :228-235.
Xie B, Druin A, Fails J, Massey S, Golub E, Franckel S, Schneider K.  2010.  Connecting generations: developing co-design methods for older adults and children. Behaviour & Information Technology. 99999(1):1-11.
Xue F, Elman H.  2008.  Convergence analysis of iterative solvers in inexact Rayleigh quotient iteration. CONVERGENCE. 31(3):877-899.
Xie B, Tom Yeh, Walsh G, Watkins I, Huang M.  2011.  Co‐designing contextual tutorials for older adults on searching health information on the internet. Proceedings of the American Society for Information Science and Technology. 48(1):1-4.
Xie Q, Memon AM.  2007.  Designing and comparing automated test oracles for GUI-based software applications. ACM Trans. Softw. Eng. Methodol.. 16(1)
Huang Y, Feamster N, Lakhina A, Xu J(J).  2007.  Diagnosing network disruptions with network-wide analysis. SIGMETRICS Perform. Eval. Rev.. 35(1):61-72.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Key-insulated public key cryptosystems. Advances in Cryptology—Eurocrypt 2002. :65-82.
Druin A, Jaeger PT, Golbeck J, Fleischmann KR, Jimmy Lin, Qu Y, Wang P, Xie B.  2009.  The Maryland Modular Method: An Approach to Doctoral Education in Information Studies. Journal of education for library and information science. 50(4):293-301.
Bakay M, Wang Z, Melcon G, Schiltz L, Xuan J, Zhao P, Sartorelli V, Seo J, Pegoraro E, Angelini C et al..  2006.  Nuclear Envelope Dystrophies Show a Transcriptional Fingerprint Suggesting Disruption of Rb–MyoD Pathways in Muscle Regeneration. BrainBrain. 129(4):996-1013.
Arya S, Mount D, Vigneron A, Xia J.  2008.  Space-time tradeoffs for proximity searching in doubling spaces. Algorithms-ESA 2008. :112-123.
Dodis Y, Katz J, Xu S, Yung M.  2002.  Strong key-insulated signature schemes. Public Key Cryptography—PKC 2003. :130-144.
Memon AM, Xie Q.  2005.  Studying the fault-detection effectiveness of GUI test cases for rapidly evolving software. Software Engineering, IEEE Transactions on. 31(10):884-896.
Ward NL, Challacombe JF, Janssen PH, Henrissat B, Coutinho PM, Wu M, Xie G, Haft DH, Sait M, Badger J et al..  2009.  Three genomes from the phylum Acidobacteria provide insight into the lifestyles of these microorganisms in soils.. Appl Environ Microbiol. 75(7):2046-56.
Xie Q, Memon AM.  2008.  Using a pilot study to derive a GUI model for automated testing. ACM Transactions on Software Engineering and Methodology (TOSEM). 18(2):7:1–7:35-7:1–7:35.
Xu Y, Ji H, Fermüller C.  2009.  Viewpoint Invariant Texture Description Using Fractal Analysis. International Journal of Computer Vision. 83(1):85-100.
Fermüller C, Xu Y, Ji H.  2008.  A View-Point Invariant Texture Descriptor. Journal of VisionJ Vis. 8(6):354-354.

Pages