Publications
Export 1734 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is M [Clear All Filters]
2004. A computational framework for incremental motion. Proceedings of the twentieth annual symposium on Computational geometry. :200-209.
2002. Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I. :586-625.
2007. A computational survey of candidate exonic splicing enhancer motifs in the model plant Arabidopsis thaliana. BMC Bioinformatics. 8(1):159-159.
1994. Computationally Efficient Algorithms for High-Dimensional Robust Estimators. CVGIP: Graphical Models and Image Processing. 56(4):289-303.
2009. Computer Help at Home: Methods and Motivations for Informal Technical Support. SIGCHI '09. :739-748.
1987. Computer-supported cooperative work (panel): is this REALLY a new field of research? Proceedings of the SIGCHI/GI conference on Human factors in computing systems and graphics interface. :227-228.
2011. Computing morse decompositions for triangulated terrains: an analysis and an experimental evaluation. Image Analysis and Processing–ICIAP 2011. :565-574.
2007. Computing most probable worlds of action probabilistic logic programs: scalable estimation for 10^30,000 worlds. Annals of Mathematics and Artificial Intelligence. 51(2):295-331.
1999. Computing nearest neighbors for moving points and applications to clustering. Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms. :931-932.
2007. COMPUTING PERFECT AND STABLE MODELS USING ORDERED MODEL TREES. Computational Intelligence. 11(1):89-112.
1995. Computing stable and partial stable models of extended disjunctive logic programs. Non-Monotonic Extensions of Logic Programming. :205-229.
2008. Computing word-pair antonymy. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :982-991.
2010. Confidence-based feature acquisition to minimize training and test costs. Proceedings of the SIAM Conference on Data Mining. 76(373):514-524.
2007. Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
2010. Connecting generations: developing co-design methods for older adults and children. Behaviour & Information Technology. 99999(1):1-11.
1991. Considerations on Loop Transfer Recovery for Non-minimum Phase Plants. Proceedings of the AIAA Aircraft Design Systems and Operations MeetingProceedings of the AIAA Aircraft Design Systems and Operations Meeting. AIAA-91-3086
2011. Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
1992. Constrained Matrix Sylvester Equations. SIAM Journal on Matrix Analysis and Applications. 13(1):1-9.
2008. A Constrained Probabilistic Petri Net Framework for Human Activity Detection in Video. Multimedia, IEEE Transactions on. 10(6):982-996.
2008. Constraint Integration for Efficient Multiview Pose Estimation with Self-Occlusions. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 30(3):493-506.
2006. Constraint Integration for Multiview Pose Estimation of Humans with Self-Occlusions. 3D Data Processing, Visualization, and Transmission, Third International Symposium on. :900-907.
2005. Constructing task visibility intervals for a surveillance system. Proceedings of the third ACM international workshop on Video surveillance & sensor networks. :141-148.