Publications

Export 1389 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
Conference Papers
Hsu CJ, Ramasubbu S, Ko MY, Pino JL, Bhattacharyya SS.  2006.  Efficient simulation of critical synchronous dataflow graphs. Proceedings of the 43rd annual Design Automation Conference. :893-898.
Pugh W, Wonnacott D.  1992.  Eliminating false data dependences using the Omega test. Proceedings of the ACM SIGPLAN 1992 conference on Programming language design and implementation. :140-151.
Karr A, Porter A, Votta L.  1996.  An empirical exploration of code evolution. International Workshop on Empirical Studies of Software Maintenance.
Perry DE, Porter A, Votta LG.  2000.  Empirical studies of software engineering: a roadmap. Proceedings of the conference on The future of Software engineering. :345-355.
Perry DE, Porter A, Votta LG.  2000.  Empirical studies of software engineering: a roadmap. Proceedings of the conference on The future of Software engineering. :345-355.
Kim J-M, Porter A, Rothermel G.  2000.  An empirical study of regression test application frequency. Proceedings of the 22nd international conference on Software engineering - ICSE '00. :126-135.
Kumar AVS, Marathe MV, Parthasarathy S, Srinivasan A.  2004.  End-to-end packet-scheduling in wireless ad-hoc networks. Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms. :1021-1030.
Puthenpurayil S, Gu R, Bhattacharyya SS.  2007.  Energy-aware data compression for wireless sensor networks. Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on. 2:II–45-II–45.
Shen CC, Plishker W, Bhattacharyya SS, Goldsman N.  2007.  An energy-driven design methodology for distributing DSP applications across wireless sensor networks. Proceedings of RTSS. :214-226.
Patel VM, Easley GR, Chellappa R, Healy DM.  2009.  Enhancing sparsity using gradients for compressive sensing. Image Processing (ICIP), 2009 16th IEEE International Conference on. :3033-3036.
Perlis D.  1994.  An Error-Theory of Consciousness. MARYLAND COMPUTER SCIENCE.
Hovemeyer D, Spacco J, Pugh W.  2005.  Evaluating and tuning a static analysis to find null pointer bugs. Proceedings of the 6th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. :13-19.
Plaisant C, Komlodi A, Lindsay F.  2000.  Evaluation challenges for a Federation of heterogeneous information providers: the case of NASA's Earth Science Information Partnerships. Enabling Technologies: Infrastructure for Collaborative Enterprises, 2000. (WET ICE 2000). Proeedings. IEEE 9th International Workshops on. :130-135.
Peters C, Clough P, Gey F, Karlgren J, Magnini B, Oard D, De Rijke M, Stempfhuber M.  2006.  Evaluation of Multilingual and Multi-modal Information Retrieval-Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006, Alicante, Spain, September 19-21, 2006, Revised Selected Papers. Seventh Workshop of the Cross-Language Evaluation Forum, CLEF 2006.
Fekete J-D, Plaisant C.  1999.  Excentric labeling: dynamic neighborhood labeling for data visualization. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :512-519.
Porter A, Votta LG.  1994.  An experiment to assess different defect detection methods for software requirements inspections. Proceedings of the 16th international conference on Software engineering. :103-112.
Reif JH, LaBean TH, Pirrung M, Rana VS, Guo B, Kingsford C, Wickham GS.  2002.  Experimental Construction of Very Large Scale DNA Databases with Associative Search. DNA computing: 7th International Workshop on DNA-Based Computers, DNA 7, Tampa, FL, USA, June 10-13, 2001: revised papers. 7:231-231.
Gupta H, Agrawala AK, Pruthi T, Shekhar C, Chellappa R.  2002.  An experimental evaluation of linear and kernel-based methods for face recognition. Applications of Computer Vision, 2002. (WACV 2002). Proceedings. Sixth IEEE Workshop on. :13-18.
Panjwani S, Tan S, Jarrin KM, Cukier M.  2005.  An experimental evaluation to determine if port scans are precursors to an attack. :602-611.
Votta LG, Porter A, Perry D.  1995.  Experimental software engineering: A report on the state of the art. INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING. 17:277-277.
Votta LG, Porter A, Perry D.  1995.  Experimental software engineering: A report on the state of the art. INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING. 17:277-277.
Lacroix Z, Moths T, Parekh K, Raschid L, Vidal M-E.  2004.  Exploiting multiple paths to express scientific queries. 16th International Conference on Scientific and Statistical Database Management, 2004. Proceedings. :357-360.
Lee B, Kang H, Plaisant C, Bederson BB.  2006.  Exploring content-actor paired network data using iterative query refinement with NetLens. Digital Libraries, 2006. JCDL '06. Proceedings of the 6th ACM/IEEE-CS Joint Conference on. :372-372.
Plaisant C, Rose J, Yu B, Auvil L, Kirschenbaum MG, Smith M N, Clement T, Lord G.  2006.  Exploring erotics in Emily Dickinson's correspondence with text mining and visual interfaces. Proceedings of the 6th ACM/IEEE-CS joint conference on Digital libraries. :141-150.
Plaisant C, Carr DA, Hasegawa H.  1993.  Exploring remote images: a telepathology workstation. Proceedings of the INTERACT '93 and CHI '93 conference on Human factors in computing systems. :518–-518–.

Pages