Publications

Export 359 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Roussopoulos N, Kotidis Y.  1998.  The Cubetree Storage Organization. VLDB. :700-700.
Roussopoulos N.  1973.  A max {m, n} algorithm for determining the graph H from its line graph G. Information Processing Letters. 2(4):108-112.
Roussopoulos N, Delis A.  1991.  Modern client-server DBMS architectures. ACM SIGMOD RecordSIGMOD Rec.. 20(3):52-61.
Roussopoulos N, Leifker D.  1985.  Direct spatial search on pictorial databases using packed R-trees. ACM SIGMOD Record. 14:17-31.
Roussopoulos N, Karagiannis D.  2009.  Conceptual modeling: past, present and the continuum of the future. Conceptual Modeling: Foundations and Applications. :139-152.
Roussopoulos N, Kotidis Y, Sismanis Y.  1999.  The active MultiSync controller of the cubetree storage organization. ACM SIGMOD Record. 28(2):582-583.
Roussopoulos N, Faloutsos C, Sellis T.  1988.  An efficient pictorial database system for PSQL. IEEE Transactions on Software Engineering. 14(5):639-650.
Roussopoulos N, Mark L.  1983.  A self-describing meta-schema for the RM/T data model. IEEE Workshop On Languages for Automation, IEEE Computer Society Press.
Roussopoulos N.  1982.  View indexing in relational databases. ACM Transactions on Database SystemsACM Trans. Database Syst.. 7(2):258-290.
Roussopoulos N, Kelley S.  1983.  A Relational Database to Support Graphical Design and Documentation. Databases for Business and Office Applications, Database Week. :135-149.
Roussopoulos N, Sismanis J, Deligiannakis A.  2006.  Dwarf cube architecture for reducing storage sizes of multidimensional data. 10/157,960(7133876)
Roussopoulos N.  1982.  The Logical Access Path Schema of a Database. IEEE Transactions on Software Engineering. SE-8(6):563-573.
Roussopoulos N, Mark L.  1985.  Schema manipulation in self-describing and self-documenting data models. International Journal of Parallel Programming. 14(1):1-28.
Roussopoulos N, Mark L.  1985.  SELF-DESCRIBING AND SELF-DOCUMENTING DATABASE SYSTEMS. Languages for automation. :275-275.
Rous B, Shneiderman B, Yankelovich N, Yoder E.  1989.  Lessons learned from the ACM hypertext on hypertext project. Proceedings of the second annual ACM conference on Hypertext. :385-386.
Rotman D, Preece J, Hammock J, Procita K, Hansen D, Parr C, Lewis D, Jacobs DW.  2012.  Dynamic changes in motivation in collaborative citizen-science projects. Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. :217-226.
Rotman D, Vieweg S, Yardi S, Chi E, Preece J, Shneiderman B, Pirolli P, Glaisyer T.  2011.  From slacktivism to activism: participatory culture in the age of social media. Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :819-822.
Rosti AVI, Ayan NF, Xiang B, Matsoukas S, Schwartz R, Dorr BJ.  2007.  Combining outputs from multiple machine translation systems. Human Language Technologies 2007: The Conference of the North American Chapter of the Association for Computational Linguistics; Proceedings of the Main Conference. :228-235.
Ross R, V.S. Subrahmanian, Grant J.  2005.  Aggregate operators in probabilistic databases. J. ACM. 52(1):54-101.
Ross DA, Hannenhalli S, Tobias JW, Cooch N, Shiekhattar R, Kadesch T.  2006.  Functional Analysis of Hes-1 in Preadipocytes. Molecular EndocrinologyMolecular Endocrinology. 20(3):698-705.
Rosenzweig R, Bronner V, Zhang D, Fushman D, Glickman MH.  2012.  Rpn1 and Rpn2 coordinate ubiquitin processing factors at the proteasome. Journal of Biological ChemistryJ. Biol. Chem..
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling and Simulation of the Escalation Archetype in Computer Security. Symposium on Simulation Software Security (SSSS 06). 38(2):495-495.
Rosenfeld A, Doermann D, DeMenthon D.  2003.  Video Mining.
Rosenfeld SN, Rus I, Cukier M.  2007.  Archetypal behavior in computer security. Journal of Systems and Software. 80(10):1594-1606.
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. 1:178-188.

Pages