Publications

Export 1377 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
Conference Papers
Itoi N, Arbaugh WA, Pollack S, Reeves D.  2001.  Personal secure booting. Information Security and Privacy. :130-144.
Resnik P, Yarowsky D.  1997.  A perspective on word sense disambiguation methods and their evaluation. Proceedings of the ACL SIGLEX workshop on tagging text with lexical semantics: Why, what, and how. 86
Zotkin DN, Shamma SA, Ru P, Duraiswami R, Davis LS.  2003.  Pitch and timbre manipulations using cortical representation of sound. Multimedia and Expo, IEEE International Conference on. 3:381-384.
Mount D, Netanyahu NS, Romanik K, Silverman R, Wu AY.  1997.  A practical approximation algorithm for the LMS line estimator. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :473-482.
Aloimonos Y, Rosenfeld A.  1994.  Principles of computer vision. Handbook of pattern recognition and image processing (vol. 2). :1-15.
Elaine Shi, Chan T, Rieffel E, Chow R, Song D.  2011.  Privacy-preserving aggregation of time-series data. 17
Resnik P.  1992.  Probabilistic tree-adjoining grammar as a framework for statistical natural language processing. Proceedings of the 14th conference on Computational linguistics-Volume 2. :418-424.
Rand W, Riolo R.  2005.  The problem with a self-adaptative mutation rate in some environments: a case study using the shaky ladder hyperplane-defined functions. Proceedings of the 2005 conference on Genetic and evolutionary computation. :1493-1500.
Rand W, Riolo R.  2005.  The problem with a self-adaptative mutation rate in some environments: a case study using the shaky ladder hyperplane-defined functions. Proceedings of the 2005 conference on Genetic and evolutionary computation. :1493-1500.
Doermann D, Rosenfeld A.  1993.  The processing of form documents. Document Analysis and Recognition, 1993., Proceedings of the Second International Conference on. :497-501.
Ramsbrock D, Berthier R, Cukier M.  2007.  Profiling Attacker Behavior Following SSH Compromises. :119-124.
Yeh RT, Mittermeir R, Roussopoulos N, Reed J.  1984.  A Programming Environment Framework Based on Reusability. Proceedings of the First International Conference on Data Engineering. :277-280.
Yeh RT, Mittermeir R, Roussopoulos N, Reed J.  1984.  A Programming Environment Framework Based on Reusability. Proceedings of the First International Conference on Data Engineering. :277-280.
Reggia JA.  1987.  Properties of a competition-based activation mechanism in neuromimetic network models. Proceedings of the First International Conference on Neural Networks.
Sabnis C, Cukier M, Ren J, Rubel P, Sanders WH, Bakken DE, Karr D.  1999.  Proteus: a flexible infrastructure to implement adaptive fault tolerance in AQuA. :149-168.
Sabnis C, Cukier M, Ren J, Rubel P, Sanders WH, Bakken DE, Karr D.  1999.  Proteus: a flexible infrastructure to implement adaptive fault tolerance in AQuA. :149-168.
Ramasamy HV, Pandey P, Lyons J, Cukier M, Sanders WH.  2002.  Quantifying the cost of providing intrusion tolerance in group communication systems. :229-238.
Zhang K, Andrade H, Raschid L, Sussman A.  2005.  Query planning for the grid: adapting to dynamic resource availability. Cluster Computing and the Grid, IEEE International Symposium on. 2:751-758.
Vidal M E, Raschid L, Marquez N, Cardenas M, Wu Y.  2006.  Query Rewriting in the Semantic Web7. Data Engineering Workshops, 22nd International Conference on. :7-7.
Kantere V, Tsoumakos D, Roussopoulos N.  2004.  Querying structured data in an unstructured P2P system. Proceedings of the 6th annual ACM international workshop on Web information and data management - WIDM '04. :64-64.
Bleiholder J, Naumann F, Raschid L, Vidal ME.  2004.  Querying Web-Accessible Life Science Sources: Which paths to choose? Proceedings of VLDB Workshop on Information Integration on the Web (IIWeb-2004). :83-83.
Bloodgood M, Ye P, Rodrigues P, Zajic D, Doermann D.  2012.  A Random Forest System Combination Approach for Error Detection in Digital Dictionaries. Innovative hybrid approaches to the processing of textual data, EACL 2012 Workshop. :78-86.
Levow G-A, Oard D, Resnik P.  2001.  Rapidly retargetable interactive translingual retrieval. Proceedings of the first international conference on Human language technology research. :1-5.
Quinn AJ, Hu C, Arisaka T, Rose A, Bederson BB.  2008.  Readability of scanned books in digital libraries. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :705-714.
Hussein M, Abd-Almageed W, Ran Y, Davis LS.  2006.  Real-Time Human Detection, Tracking, and Verification in Uncontrolled Camera Motion Environments. Computer Vision Systems, 2006 ICVS '06. IEEE International Conference on. :41-41.

Pages