Publications

Export 1734 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Conference Papers
Deshpande A, Guestrin C, Hong W, Madden S.  2005.  Exploiting Correlated Attributes in Acquisitional Query Processing. 21st International Conference on Data Engineering, 2005. ICDE 2005. Proceedings. :143-154.
Lacroix Z, Moths T, Parekh K, Raschid L, Vidal M-E.  2004.  Exploiting multiple paths to express scientific queries. 16th International Conference on Scientific and Statistical Database Management, 2004. Proceedings. :357-360.
Mishra A, Rozner E, Banerjee S, Arbaugh WA.  2005.  Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. :29-29.
Getoor L, Mihalkova L.  2011.  Exploiting statistical and relational information on the web and in social media. Proceedings of the fourth ACM international conference on Web search and data mining. :9-10.
Martin, M.P.  2003.  Exploratory studies of turbulence/chemistry interaction in hypersonic flows. 36 th AIAA Thermophysics Conference.
Sayeed AB, Nguyen HC, Meyer TJ, Weinberg A.  2010.  Expresses-an-opinion-about: using corpus statistics in an information extraction approach to opinion mining. :1095-1103.
Marchionini G, Hert C, Liddy L, Shneiderman B.  2000.  Extending understanding of federal statistics in tables. Proceedings of the 2000 annual national conference on Digital government research. :1-7.
McMaster S, Memon AM.  2009.  An Extensible Heuristic-Based Framework for GUI Test Case Maintenance. Software Testing, Verification and Validation Workshops, 2009. ICSTW '09. International Conference on. :251-254.
McMaster S, Memon AM.  2009.  An Extensible Heuristic-Based Framework for GUI Test Case Maintenance. Software Testing, Verification and Validation Workshops, 2009. ICSTW '09. International Conference on. :251-254.
De Floriani L, Mesmoudi MM, Danovaro E.  2002.  Extraction of Critical Nets Based on a Discrete Gradient Vector Field. Proceedings of Eurographics.
Dyer C, Cordova A, Mont A, Jimmy Lin.  2008.  Fast, easy, and cheap: Construction of statistical machine translation models with MapReduce. Proceedings of the Third Workshop on Statistical Machine Translation. :199-207.
Lim S-N, Mittal A, Davis LS, Paragios N.  2005.  Fast illumination-invariant background subtraction using two views: error analysis, sensor placement and applications. Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference on. 1:1071-1078vol.1-1071-1078vol.1.
Arya S, Phamdo N, Farvardin N, Mount D.  1993.  Fast search algorithms with applications to split and multi-stage vector quantization of speech lsp parameters. Speech Coding for Telecommunications, 1993. Proceedings., IEEE Workshop on. :65-66.
McMaster S, Memon AM.  2007.  Fault Detection Probability Analysis for Coverage-Based Test Suite Reduction. Software Maintenance, 2007. ICSM 2007. IEEE International Conference on. :335-344.
McMaster S, Memon AM.  2007.  Fault Detection Probability Analysis for Coverage-Based Test Suite Reduction. Software Maintenance, 2007. ICSM 2007. IEEE International Conference on. :335-344.
Strecker J, Memon AM.  2007.  Faults' context matters. Fourth international workshop on Software quality assurance: in conjunction with the 6th ESEC/FSE joint meeting. :112-115.
Baidya B, Gupta SK, Mukherjee T.  1998.  Feature-recognition for MEMS extraction. :13-16.
Sharma A, Martin JR, Anand N, Cukier M, Sanders WH.  2004.  Ferret: a host vulnerability checking tool. :389-394.
Bender A, Sherwood R, Monner D, Goergen N, Spring N, Bhattacharjee B.  2009.  Fighting Spam with the NeighborhoodWatch DHT. IEEE INFOCOM 2009. :1755-1763.
Molina J, Chorin X, Cukier M.  2007.  Filesystem activity following a SSH compromise: an empirical study of file sequences. :144-155.
Consolvo S, Klasnja P, McDonald DW, Avrahami D, Froehlich J, LeGrand L, Libby R, Mosher K, Landay JA.  2008.  Flowers or a robot army?: encouraging awareness & activity with personal, mobile displays Proceedings of the 10th international conference on Ubiquitous computing. :54-63.
Consolvo S, Klasnja P, McDonald DW, Avrahami D, Froehlich J, LeGrand L, Libby R, Mosher K, Landay JA.  2008.  Flowers or a robot army?: encouraging awareness & activity with personal, mobile displays Proceedings of the 10th international conference on Ubiquitous computing. :54-63.
Snover M, Madnani N, Dorr BJ, Schwartz R.  2009.  Fluency, adequacy, or HTER?: exploring different human judgments with a tunable MT metric Proceedings of the Fourth Workshop on Statistical Machine Translation. :259-268.
Ma H, Doermann D.  2005.  Font identification using the grating cell texture operator. SPIE Conference on Document Recogntion and Retreival XXII. :148-156.
Roussopoulos N, Mark L.  1984.  A framework for self-describing and self-documenting database systems. NBS Trends and Application Conference.

Pages