Publications

Search
Export 359 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Roussopoulos N, Kotidis Y, Labrinidis A, Sismanis Y.  2003.  The Opsis project: materialized views for data warehouses and the web. Advances in Informatics. :64-81.
Roussopoulos N, Kang H.  1991.  A pipeline N-way join algorithm based on the 2-way semijoin program. IEEE Transactions on Knowledge and Data Engineering. 3(4):486-495.
Roussopoulos N, Bader C.  1985.  Dynamic access control for relational views.. INFO. SYST.. 10(3):361-369.
Roussopoulos N, Mark L.  1984.  A framework for self-describing and self-documenting database systems. NBS Trends and Application Conference.
Roussopoulos N, Yeh RT.  1985.  SEES—A Software testing Environment Support System. IEEE Transactions on Software Engineering. SE-11(4):355-366.
Roussopoulos N, Kang H.  1986.  Principles and techniques in the design of ADMS+((advanced data-base management system)). Computer. 19:19-23.
Roussopoulos N.  1998.  Materialized views and data warehouses. ACM SIGMOD RecordSIGMOD Rec.. 27(1):21-26.
Roussopoulos N, Leifker D.  1984.  An introduction to PSQL: A pictorial structured query language. Proc. IEEE Workshop on Visual Languages. :77-87.
Roussopoulos N.  1986.  Engineering Information Systems: Builders and Designers Perspective. SIGMOD Conference. :1-3.
Roussopoulos N, Kelley S.  1984.  GDDT--A graphical design and documentation tool for software development. Computers & Graphics. 8(3):309-323.
Roussopoulos N, Mylopoulos J.  1975.  Using semantic networks for data base management. Proceedings of the 1st International Conference on Very Large Data Bases. :144-172.
Roussopoulos N, Economou N, Stamenas A.  1993.  ADMS: a testbed for incremental access methods. IEEE Transactions on Knowledge and Data Engineering. 5(5):762-774.
Roussopoulos N, Kotidis Y.  1998.  The Cubetree Storage Organization. VLDB. :700-700.
Roussopoulos N.  1973.  A max {m, n} algorithm for determining the graph H from its line graph G. Information Processing Letters. 2(4):108-112.
Rous B, Shneiderman B, Yankelovich N, Yoder E.  1989.  Lessons learned from the ACM hypertext on hypertext project. Proceedings of the second annual ACM conference on Hypertext. :385-386.
Rotman D, Preece J, Hammock J, Procita K, Hansen D, Parr C, Lewis D, Jacobs DW.  2012.  Dynamic changes in motivation in collaborative citizen-science projects. Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. :217-226.
Rotman D, Vieweg S, Yardi S, Chi E, Preece J, Shneiderman B, Pirolli P, Glaisyer T.  2011.  From slacktivism to activism: participatory culture in the age of social media. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :819-822.
Rosti AVI, Ayan NF, Xiang B, Matsoukas S, Schwartz R, Dorr BJ.  2007.  Combining outputs from multiple machine translation systems. Human Language Technologies 2007: The Conference of the North American Chapter of the Association for Computational Linguistics; Proceedings of the Main Conference. :228-235.
Ross DA, Hannenhalli S, Tobias JW, Cooch N, Shiekhattar R, Kadesch T.  2006.  Functional Analysis of Hes-1 in Preadipocytes. Molecular EndocrinologyMolecular Endocrinology. 20(3):698-705.
Ross R, V.S. Subrahmanian, Grant J.  2005.  Aggregate operators in probabilistic databases. J. ACM. 52(1):54-101.
Rosenzweig R, Bronner V, Zhang D, Fushman D, Glickman MH.  2012.  Rpn1 and Rpn2 coordinate ubiquitin processing factors at the proteasome. Journal of Biological ChemistryJ. Biol. Chem..
Rosenfeld A, Doermann D, DeMenthon D.  2003.  Video Mining.
Rosenfeld SN, Rus I, Cukier M.  2007.  Archetypal behavior in computer security. Journal of Systems and Software. 80(10):1594-1606.
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. 1:178-188.
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling and Simulation of the Escalation Archetype in Computer Security. Symposium on Simulation Software Security (SSSS 06). 38(2):495-495.

Pages