Publications

Export 359 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Roussopoulos N, Kelley S.  1983.  A Relational Database to Support Graphical Design and Documentation. Databases for Business and Office Applications, Database Week. :135-149.
Roussopoulos N, Sismanis J, Deligiannakis A.  2006.  Dwarf cube architecture for reducing storage sizes of multidimensional data. 10/157,960(7133876)
Roussopoulos N.  1982.  The Logical Access Path Schema of a Database. IEEE Transactions on Software Engineering. SE-8(6):563-573.
Roussopoulos N, Mark L.  1985.  Schema manipulation in self-describing and self-documenting data models. International Journal of Parallel Programming. 14(1):1-28.
Roussopoulos N, Mark L.  1985.  SELF-DESCRIBING AND SELF-DOCUMENTING DATABASE SYSTEMS. Languages for automation. :275-275.
Roussopoulos N, Kotidis Y, Labrinidis A, Sismanis Y.  2003.  The Opsis project: materialized views for data warehouses and the web. Advances in Informatics. :64-81.
Roussopoulos N, Kang H.  1991.  A pipeline N-way join algorithm based on the 2-way semijoin program. IEEE Transactions on Knowledge and Data Engineering. 3(4):486-495.
Roussopoulos N, Bader C.  1985.  Dynamic access control for relational views.. INFO. SYST.. 10(3):361-369.
Roussopoulos N, Mark L.  1984.  A framework for self-describing and self-documenting database systems. NBS Trends and Application Conference.
Roussopoulos N, Yeh RT.  1985.  SEES—A Software testing Environment Support System. IEEE Transactions on Software Engineering. SE-11(4):355-366.
Roussopoulos N, Kang H.  1986.  Principles and techniques in the design of ADMS+((advanced data-base management system)). Computer. 19:19-23.
Roussopoulos N.  1998.  Materialized views and data warehouses. ACM SIGMOD RecordSIGMOD Rec.. 27(1):21-26.
Roussopoulos N, Leifker D.  1984.  An introduction to PSQL: A pictorial structured query language. Proc. IEEE Workshop on Visual Languages. :77-87.
Roussopoulos N.  1986.  Engineering Information Systems: Builders and Designers Perspective. SIGMOD Conference. :1-3.
Rous B, Shneiderman B, Yankelovich N, Yoder E.  1989.  Lessons learned from the ACM hypertext on hypertext project. Proceedings of the second annual ACM conference on Hypertext. :385-386.
Rotman D, Preece J, Hammock J, Procita K, Hansen D, Parr C, Lewis D, Jacobs DW.  2012.  Dynamic changes in motivation in collaborative citizen-science projects. Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. :217-226.
Rotman D, Vieweg S, Yardi S, Chi E, Preece J, Shneiderman B, Pirolli P, Glaisyer T.  2011.  From slacktivism to activism: participatory culture in the age of social media. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :819-822.
Rosti AVI, Ayan NF, Xiang B, Matsoukas S, Schwartz R, Dorr BJ.  2007.  Combining outputs from multiple machine translation systems. Human Language Technologies 2007: The Conference of the North American Chapter of the Association for Computational Linguistics; Proceedings of the Main Conference. :228-235.
Ross R, V.S. Subrahmanian, Grant J.  2005.  Aggregate operators in probabilistic databases. J. ACM. 52(1):54-101.
Ross DA, Hannenhalli S, Tobias JW, Cooch N, Shiekhattar R, Kadesch T.  2006.  Functional Analysis of Hes-1 in Preadipocytes. Molecular EndocrinologyMolecular Endocrinology. 20(3):698-705.
Rosenzweig R, Bronner V, Zhang D, Fushman D, Glickman MH.  2012.  Rpn1 and Rpn2 coordinate ubiquitin processing factors at the proteasome. Journal of Biological ChemistryJ. Biol. Chem..
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling and Simulation of the Escalation Archetype in Computer Security. Symposium on Simulation Software Security (SSSS 06). 38(2):495-495.
Rosenfeld A, Doermann D, DeMenthon D.  2003.  Video Mining.
Rosenfeld SN, Rus I, Cukier M.  2007.  Archetypal behavior in computer security. Journal of Systems and Software. 80(10):1594-1606.
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. 1:178-188.

Pages