Publications

Export 636 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is N  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Cleaveland R, Iyer PS, Narasimha M.  2005.  Probabilistic temporal logics via the modal mu-calculus. Theoretical Computer Science. 342(2-3):316-350.
Cleaveland R, L\üttgen G, Natarajan V.  1996.  A process algebra with distributed priorities. CONCUR'96: Concurrency Theory. :34-49.
Miara RJ, Musselman JA, Navarro JA, Shneiderman B.  1983.  Program indentation and comprehensibility. Communications of the ACM. 26(11):861-867.
Clark R, Feamster N, Nayak A, Reimers A.  2009.  Pushing Enterprise Security Down the Network Stack. GT-CS-09-03
Q
Mount D, Netanyahu NS, Piatko CD, Silverman R, Wu AY.  2000.  Quantile approximation for robust statistical estimation and k-enclosing problems. International Journal of Computational Geometry and Applications. 10(6):593-608.
Bleiholder J, Khuller S, Naumann F, Raschid L, Wu Y.  2006.  Query planning in the presence of overlapping sources. Advances in Database Technology-EDBT 2006. :811-828.
Bleiholder J, Khuller S, Naumann F, Raschid L, Wu Y.  2006.  Query planning in the presence of overlapping sources. Advances in Database Technology-EDBT 2006. :811-828.
Bleiholder J, Naumann F, Raschid L, Vidal ME.  2004.  Querying Web-Accessible Life Science Sources: Which paths to choose? Proceedings of VLDB Workshop on Information Integration on the Web (IIWeb-2004). :83-83.
R
Dillencourt MB, Mount D, Netanyahu NS.  1992.  A randomized algorithm for slope selection. International Journal of Computational Geometry and Applications. 2(1):1-27.
Srinivasan A.  2007.  Randomized Algorithms and Probabilistic Analysis in Wireless Networking. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. 4665:54-57.
Au T-C, Nau DS.  2007.  Reactive Query Policies: A Formalism for Planning with Volatile External Information. :243-250.
Shivashankar V, Jain R, Kuter U, Nau DS.  2011.  Real-Time Planning for Covering an Initially-Unknown Spatial Environment.
Rhoades J, Turk G, Bell A, State A, Neumann U, Varshney A.  1992.  Real-time procedural textures. Proceedings of the 1992 symposium on Interactive 3D graphics. :95-100.
Colwell RR, Huq A, Islam SM, Aziz KMA, Yunus M, Khan HN, Mahmud A, Sack BR, Nair GB, Chakraborty J et al..  2003.  Reduction of Cholera in Bangladeshi Villages by Simple Filtration. Proceedings of the National Academy of SciencesPNAS. 100(3):1051-1055.
Nagarajan A, Memon AM.  2003.  Refactoring using event-based profiling. First International Workshop on REFactoring: Achievements, Challenges, Effects (REFACE).
Plaisant C, Venkatraman M, Ngamkajorwiwat K, Barth R, Harberts B, Feng W.  1999.  Refining query previews techniques for data with multivalued attributes: the case of NASA EOSDIS. Research and Technology Advances in Digital Libraries, 1999. ADL '99. Proceedings. IEEE Forum on. :50-59.
Diehl CP, Namata G, Getoor L.  2007.  Relationship identification for social network discovery. PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE. 22(1):546-546.
Nau DS, Reggia JA.  1986.  Relationships between deductive and abductive inference in knowledge-based diagnostic problem solving. Expert Database Systems: Proceedings of the First International Workshop. New York: Benjamin Cummings.
Yilmaz C, Porter A, Krishna AS, Memon AM, Schmidt DC, Gokhale AS, Natarajan B.  2007.  Reliable Effects Screening: A Distributed Continuous Quality Assurance Process for Monitoring Performance Degradation in Evolving Software Systems. Software Engineering, IEEE Transactions on. 33(2):124-141.
Chellappa R, Ni J, Patel VM.  2011.  Remote identification of faces: Problems, prospects, and progress. Pattern Recognition Letters.
Elsayed T, Oard D, Namata G.  2008.  Resolving personal names in email using context expansion. Association for Computational Linguistics (ACL).
Nayak A K, Reimers A, Feamster N, Clark R.  2009.  Resonance: dynamic access control for enterprise networks. Proceedings of the 1st ACM workshop on Research on enterprise networking. :11-18.
Kim J-S, Nam B, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2006.  Resource Discovery Techniques in Distributed Desktop Grid Environments. Proceedings of the 7th IEEE/ACM International Conference on Grid Computing. :9-16.
Nagy JG, O'Leary DP.  1998.  Restoring Images Degraded by Spatially Variant Blur. SIAM Journal on Scientific Computing. 19(4):1063-1082.
Navlakha S, Schatz MC, Kingsford C.  2009.  Revealing biological modules via graph summarization. Journal of Computational Biology. 16(2):253-264.

Pages