Publications

Export 1734 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Dachman-Soled D, Gennaro R, Krawczyk H, Malkin T.  2012.  Computational Extractors and Pseudorandomness. Theory of Cryptography. :383-403.
Mount D, Netanyahu NS, Piatko CD, Silverman R, Wu AY.  2004.  A computational framework for incremental motion. Proceedings of the twentieth annual symposium on Computational geometry. :200-209.
Eiter T, Mascardi V, V.S. Subrahmanian.  2002.  Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I. :586-625.
Pertea M, Mount SM, Salzberg SL.  2007.  A computational survey of candidate exonic splicing enhancer motifs in the model plant Arabidopsis thaliana. BMC Bioinformatics. 8(1):159-159.
Mount D, Netanyahu NS.  1994.  Computationally Efficient Algorithms for High-Dimensional Robust Estimators. CVGIP: Graphical Models and Image Processing. 56(4):289-303.
Poole EShehan, Chetty M, Morgan T, Grinter RE, W. Edwards K.  2009.  Computer Help at Home: Methods and Motivations for Informal Technical Support. SIGCHI '09. :739-748.
Greif I, Curtis B, Krasner H, Malone TW, Shneiderman B.  1987.  Computer-supported cooperative work (panel): is this REALLY a new field of research? Proceedings of the SIGCHI/GI conference on Human factors in computing systems and graphics interface. :227-228.
Kao TC, Mount D.  1991.  Computing generalized Voronoi diagrams in improved time and space bounds.
Vitali M, De Floriani L, Magillo P.  2011.  Computing morse decompositions for triangulated terrains: an analysis and an experimental evaluation. Image Analysis and Processing–ICIAP 2011. :565-574.
Khuller S, Martinez M, Nau DS, Sliva A, Simari G, Subrahmanian V.  2007.  Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10^30,000 worlds. Annals of Mathematics and Artificial Intelligence. 51(2):295-331.
Kanungo T, Mount D, Netanyahu NS, Piatko C, Silverman R, Wu AY.  1999.  Computing nearest neighbors for moving points and applications to clustering. Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms. :931-932.
Fernández1 J A, Minker J, Yahya A.  2007.  COMPUTING PERFECT AND STABLE MODELS USING ORDERED MODEL TREES. Computational Intelligence. 11(1):89-112.
Minker J, Perlis D.  1985.  Computing protected circumscription. The Journal of Logic Programming. 2(4):235-249.
Ruiz C, Minker J.  1995.  Computing stable and partial stable models of extended disjunctive logic programs. Non-Monotonic Extensions of Logic Programming. :205-229.
Mohammad S, Dorr BJ, Hirst G.  2008.  Computing word-pair antonymy. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :982-991.
desJardins M, MacGlashan J, Wagstaff KL.  2010.  Confidence-based feature acquisition to minimize training and test costs. Proceedings of the SIAM Conference on Data Mining. 76(373):514-524.
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, M. Wu, Oard D.  2007.  Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
Xie B, Druin A, Fails J, Massey S, Golub E, Franckel S, Schneider K.  2010.  Connecting generations: developing co-design methods for older adults and children. Behaviour & Information Technology. 99999(1):1-11.
Monahemi M, Barlow J, O'Leary DP.  1991.  Considerations on Loop Transfer Recovery for Non-minimum Phase Plants. Proceedings of the AIAA Aircraft Design Systems and Operations MeetingProceedings of the AIAA Aircraft Design Systems and Operations Meeting. AIAA-91-3086
Katz J, Malka L.  2011.  Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
Barlow JB, Monahemi MM, O'Leary DP.  1992.  Constrained Matrix Sylvester Equations. SIAM Journal on Matrix Analysis and Applications. 13(1):1-9.
Albanese M, Chellappa R, Moscato V, Picariello A, V.S. Subrahmanian, Turaga P, Udrea O.  2008.  A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
Gupta A, Mittal A, Davis LS.  2008.  Constraint Integration for Efficient Multiview Pose Estimation with Self-Occlusions. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(3):493-506.
Gupta A, Mittal A, Davis LS.  2006.  Constraint Integration for Multiview Pose Estimation of Humans with Self-Occlusions. 3D Data Processing, Visualization, and Transmission, Third International Symposium on. :900-907.
Lim S-N, Mittal A, Davis LS.  2005.  Constructing task visibility intervals for a surveillance system. Proceedings of the third ACM international workshop on Video surveillance & sensor networks. :141-148.

Pages