Publications

Export 620 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is T  [Clear All Filters]
2005
Dunlavy DM, O'Leary DP, Klimov D, Thirumalai D.  2005.  HOPE: A Homotopy Optimization Method for Protein Structure Prediction. Journal of Computational Biology. 12(10):1275-1288.
Basili VR, Turner AJ.  2005.  Iterative enhancement: a practical technique for software development. Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili. 1:28-28.
Tabatabaee V, Tiwari A, Hollingsworth J.  2005.  Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
Tabatabaee V, Tiwari A, Hollingsworth J.  2005.  Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
Tom Yeh, Grauman K, Tollmar K, Darrell T.  2005.  A picture is worth a thousand keywords: image-based object search on a mobile platform. CHI '05 extended abstracts on Human factors in computing systems. :2025-2028.
Yue Z, Zhao W, Chellappa R.  2005.  Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
Taylor EM, Martin, M.P, Smits AJ.  2005.  Preliminary Study of the Turbulence Structure in Supersonic Boundary Layers using DNS Data. 35th AIAA Fluid Dynamics Conference.
Udrea O, Yu D, Hung E, Subrahmanian V.  2005.  Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
Lathan CE, Tracey MR, Vice JM, Druin A, Plaisant C.  2005.  Robotic apparatus and wireless communication system. 10/085,821(6895305)
Samet H, Tanin E, Golubchik L.  2005.  Scalable data collection infrastructure for digital government applications. Proceedings of the 2005 national conference on Digital government research. :305-306.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Thornber KK, Jacobs DW.  2005.  Torrance-sparrow off-specular reflection and linear subspaces for object recognition. 10/230,888(6900805)
Katz J, MacKenzie P, Taban G, Gligor V.  2005.  Two-server password-only authenticated key exchange. Applied Cryptography and Network Security. :175-206.
Resnik P, Elkiss A, Lau E, Taylor H.  2005.  The web in theoretical linguistics research: Two case studies using the Linguist’s Search Engine. 31st Meeting of the Berkeley Linguistics Society. :265-276.
2004
Teich J, Bhattacharyya SS.  2004.  Analysis of dataflow programs with interval-limited data-rates. Computer Systems: Architectures, Modeling, and Simulation. :507-518.
Ghallab M, Nau DS, Traverso P.  2004.  Automated Planning: Theory and Practice.
Fomin EDDFV, Hajiaghayi MT, Thilikos DM.  2004.  Bidimensional Parameters and Local Treewidth. Latin 2004: Theoretical Informatics: 6th Latin American Symposium, Buenos Aires, Argentina, April 5-8, 2004: Proceedings. :109-109.
Wu M, Trappe W, Wang ZJ, Liu KJR.  2004.  Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
M. Wu, Trappe W, Wang ZJ, Liu KJR.  2004.  Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
Goodrich MT, Tamassia R, Mount D.  2004.  Data Structures and Algorithms in C++.
Chetty M, Tucker W, Blake E.  2004.  Developing Locally Relevant Software Applications for Rural Areas: A South African Example. SAICSIT '04. :239-243.
Asgari S, Basili VR, Costa P, Donzelli P, Hochstein L, Lindvall M, Rus I, Shull F, Tvedt R, Zelkowitz MV.  2004.  Empirical-based estimation of the effect on software dependability of a technique for architecture conformance verification. Proceedings of the ICSE 2004 Workshop on Architecting Dependable Systems, Edinburgh, UK.
Tang Z, Duraiswami R, Gumerov NA.  2004.  FAST ALGORITHMS TO COMPUTE MATRIX-VECTOR PRODUCTS FOR PASCAL MATRICES. Technical Reports from UMIACS UMIACS-TR-2004-08.
Tsoumakos D, Roussopoulos N.  2004.  A Framework for Sharing Voluminous Content in P2P Systems. PDPTA. :1031-1036.
Wang JZ, M. Wu, Trappe W, Liu KJR.  2004.  Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process.. 2004:2153-2173.

Pages