Publications
Export 620 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is T [Clear All Filters]
2005. HOPE: A Homotopy Optimization Method for Protein Structure Prediction. Journal of Computational Biology. 12(10):1275-1288.
2005. Iterative enhancement: a practical technique for software development. Foundations of Empirical Software Engineering: The Legacy of Victor R. BasiliFoundations of Empirical Software Engineering: The Legacy of Victor R. Basili. 1:28-28.
2005. Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
2005. Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
2005. A picture is worth a thousand keywords: image-based object search on a mobile platform. CHI '05 extended abstracts on Human factors in computing systems. :2025-2028.
2005. Pose-Encoded Spherical Harmonics for Robust Face Recognition Using a Single Image. Analysis and Modelling of Faces and GesturesAnalysis and Modelling of Faces and Gestures. 3723:229-243.
2005. Preliminary Study of the Turbulence Structure in Supersonic Boundary Layers using DNS Data. 35th AIAA Fluid Dynamics Conference.
2005. Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
2005. Scalable data collection infrastructure for digital government applications. Proceedings of the 2005 national conference on Digital government research. :305-306.
2005. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
2005. Torrance-sparrow off-specular reflection and linear subspaces for object recognition. 10/230,888(6900805)
2005. Two-server password-only authenticated key exchange. Applied Cryptography and Network Security. :175-206.
2005. The web in theoretical linguistics research: Two case studies using the Linguist’s Search Engine. 31st Meeting of the Berkeley Linguistics Society. :265-276.
2004. Analysis of dataflow programs with interval-limited data-rates. Computer Systems: Architectures, Modeling, and Simulation. :507-518.
2004. Bidimensional Parameters and Local Treewidth. Latin 2004: Theoretical Informatics: 6th Latin American Symposium, Buenos Aires, Argentina, April 5-8, 2004: Proceedings. :109-109.
2004. Collusion resistant multimedia fingerprinting: A unified framework. Electronic Imaging Symposium: Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, CA, Proc. of SPIE. 5306:748-759.
2004. Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
2004. Developing Locally Relevant Software Applications for Rural Areas: A South African Example. SAICSIT '04. :239-243.
2004. Empirical-based estimation of the effect on software dependability of a technique for architecture conformance verification. Proceedings of the ICSE 2004 Workshop on Architecting Dependable Systems, Edinburgh, UK.
2004. FAST ALGORITHMS TO COMPUTE MATRIX-VECTOR PRODUCTS FOR PASCAL MATRICES. Technical Reports from UMIACS UMIACS-TR-2004-08.
2004. Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process.. 2004:2153-2173.