Publications

Export 748 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Sahinalp SC, Vishkin U.  1994.  Symmetry breaking for suffix tree construction. Proceedings of the twenty-sixth annual ACM symposium on Theory of computing. :300-309.
Reggia JA.  1995.  Symmetries of natural and artificial neural networks. Symmetry: Culture and Science. 6:446-449.
Aggarwal G, Biswas S, Chellappa R.  2007.  Symmetric Objects are Hardly Ambiguous. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-7.
Habash N, Dorr BJ, Monz C.  2009.  Symbolic-to-statistical hybridization: extending generation-heavy machine translation. Machine Translation. 23(1):23-63.
Chaudhuri A, Foster JS.  2010.  Symbolic security analysis of ruby-on-rails web applications. Proceedings of the 17th ACM conference on Computer and communications security. :585-594.
Dorr BJ, Habash NY, Monz C.  2004.  Symbolic MT With Statistical NLP Components.
Bultan T, Gerber R, Pugh W.  1997.  Symbolic model checking of infinite state systems using Presburger arithmetic. Computer Aided Verification. :400-411.
Kia O, Doermann D, Rosenfeld A, Chellappa R.  1997.  Symbolic Compression and Processing of Document Images. LAMP-TR-004,CFAR-TR-849,CS-TR-3734
Anderson ML, Perlis D.  2002.  Symbol systems. Encyclopedia of Cognitive Science.
Lumezanu C, Baden R, Levin D, Spring N, Bhattacharjee B.  2009.  Symbiotic relationships in internet routing overlays. Proceedings of the 6th USENIX symposium on Networked systems design and implementation. :467-480.
O'Leary DP.  2000.  Symbiosis between Linear Algebra and Optimization. Journal of Computational and Applied Mathematics. 123:447-465.
Newsome J, Elaine Shi, Song D, Perrig A.  2004.  The sybil attack in sensor networks: analysis & defenses. :259-268.
Alexander DS, Hicks MW, Kakkar P, Keromytis AD, Shaw M, Moore JT, Gunter CA, Jim T, Nettles SM, Smith JM.  1998.  The switchware active network implementation. The ML Workshop, International Conference on Functional Programming (ICFP).
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.
Korman CE, Mayergoyz ID.  1995.  Switching as an exit problem. Magnetics, IEEE Transactions on. 31(6):3545-3547.
Anwer M B, Motiwala M, Bin Tariq M, Feamster N.  2010.  SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware. SIGCOMM Comput. Commun. Rev.. 40(4):183-194.
RodrIGuez A, Grushin A, Reggia JA, HAUPTMAN AMI, SIPPER M, PAN Z, Reggia JA, GAO D, DARABOS C, GIACOBINI M et al..  2007.  Swarm Intelligence Systems Using Guided Self-Organization for Collective Problem Solving. Advances in Complex Systems. 10(1):5-34.
Miner D, desJardins M.  2008.  The swarm application framework. In Proceedings of the 23rd AAAI Conference on Artificial Intelligence (Student Abstract.
O'Leary DP.  1995.  The SVD in Image Restoration. SVD and Signal Processing III: Algorithms, Architectures, and ApplicationsSVD and Signal Processing III: Algorithms, Architectures, and Applications. :315-322.
Jiwnani K, Zelkowitz MV.  2004.  Susceptibility matrix: a new aid to software auditing. Security Privacy, IEEE. 2(2):16-21.
Preece J, Shneiderman B.  1995.  Survival of the fittest: the evolution of multimedia user interfaces. ACM Computing Surveys. 27(4):557-559.
Zelkowitz MV.  1979.  Surveyor's Forum: A Question of Transition. ACM Computing Surveys (CSUR). 11(4):411-412.
Kim Y, Sutreja N, Froehlich J, Findlater L.  Submitted.  Surveying the Accessibility of Mobile Touchscreen Games for Persons with Motor Impairments: A Preliminary Analysis. terpconnect.umd.edu.
Bajcsy P, Cardone A, Chalfoun J, Halter M, Juba D, Kociolek M, Majurski M, Peskin A, Simon C, Simon M et al..  2015.  Survey statistics of automated segmentations applied to optical imaging of mammalian cells. BMC bioinformatics. 16:1.
Yu M, Rexford J, Sun X, Rao S, Feamster N.  2011.  A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.

Pages