Publications

Export 969 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Mount D, Arya S.  1997.  ANN: A library for approximate nearest neighbor searching. CGC 2nd Annual Fall Workshop on Computational Geometry.
Tariq M, Zeitoun A, Valancius V, Feamster N, Ammar M.  2008.  Answering what-if deployment and configuration questions with wise. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :99-110.
Zhou SK, Aggarwal G, Chellappa R, Jacobs DW.  2007.  Appearance Characterization of Linear Lambertian Objects, Generalized Photometric Stereo, and Illumination-Invariant Face Recognition. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 29(2):230-245.
Josyula DP, Fults S, Anderson ML, Wilson S, Perlis D.  2007.  Application of MCL in a dialog agent. Third Language and Technology Conference.
Nau DS, Au T-C, Ilghami O, Kuter U, Wu D, Yaman F, Munoz-Avila H, Murdock JW.  2005.  Applications of SHOP and SHOP2. Intelligent Systems, IEEE. 20(2):34-41.
Fraser T, Petroni J., Arbaugh WA.  2006.  Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
Hussein ME, Abd-Almageed W.  2009.  Approximate kernel matrix computation on GPUs forlarge scale learning applications. Proceedings of the 23rd international conference on Supercomputing. :511-512.
Arya S, Mount D.  1993.  Approximate nearest neighbor queries in fixed dimensions. Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms. :271-280.
Arya S, Mount D.  1993.  Approximate nearest neighbor searching. Proceedings of 4th Annual ACMSIAM Symposium on Discrete Algorithms (SODA’93). :271-280.
Arya S, da Fonseca GD, Mount D.  2011.  Approximate polytope membership queries. Proceedings of 43rd Annual ACM Symposium on Theory of Computing. :579-586.
Arya S, Mount D.  2000.  Approximate range searching. Computational Geometry. 17(3–4):135-152.
Arya S, Mount D.  1995.  Approximate range searching. Proceedings of the eleventh annual symposium on Computational geometry. :172-181.
Auer P, Long PM, Srinivasan A.  1997.  Approximating hyper-rectangles: learning and pseudo-random sets. Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. :314-323.
Algazi VR, Duda RO, Duraiswami R, Gumerov NA, Tang Z.  2002.  Approximating the head-related transfer function using simple geometric models of the head and torso. The Journal of the Acoustical Society of America. 112:2053-2053.
Gandhi R, Khuller S, Srinivasan A, Wang N.  2003.  Approximation Algorithms for Channel Allocation Problems in Broadcast Networks. Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques. 2764:821-826.
Arya S, Cheng S-W, Mount D.  1998.  Approximation algorithms for multiple-tool miling. Proceedings of the fourteenth annual symposium on Computational geometry. :297-306.
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A.  2011.  Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Koponen T, Shenker S, Balakrishnan H, Feamster N, Ganichev I, Ghodsi A, Godfrey BP, McKeown N, Parulkar G, Raghavan B et al..  2011.  Architecting for innovation. SIGCOMM Comput. Commun. Rev.. 41(3):24-36.
Kianzad V, Saha S, Schlessman J, Aggarwal G, Bhattacharyya SS, Wolf W, Chellappa R.  2005.  An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.
Saha S, Kianzad V, Schlessman J, Aggarwal G, Bhattacharyya SS, Chellappa R, Wolf W.  2009.  An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
Pal P, Rubel P, Atighetchi M, Webber F, Sanders WH, Seri M, Ramasamy HG, Lyons J, Courtney T, Agbaria A et al..  2006.  An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
Pal P, Rubel P, Atighetchi M, Webber F, Sanders WH, Seri M, Ramasamy HG, Lyons J, Courtney T, Agbaria A et al..  2006.  An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Drury J, Resnik P, Weinberg A, Gennari S, Aoshima S.  2002.  Argument structure saturation in a constraint based model.

Pages