Publications

Export 853 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Feige U, Halldórsson MM, Kortsarz G, Srinivasan A.  2003.  Approximating the domatic number. SIAM Journal on Computing. 32(1):172-195.
Friedler SA, Mount D.  2010.  Approximation algorithm for the kinetic robust K-center problem. Computational Geometry. 43(6–7):572-586.
Koponen T, Shenker S, Balakrishnan H, Feamster N, Ganichev I, Ghodsi A, Godfrey BP, McKeown N, Parulkar G, Raghavan B et al..  2011.  Architecting for innovation. SIGCOMM Comput. Commun. Rev.. 41(3):24-36.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Varshavsky A, Chen MY, de Lara E, Froehlich J, Haehnel D, Hightower J, LaMarca A, Potter F, Sohn T, Tang K et al..  2005.  Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
Filho J.E.Martinelli, Lopes R.M., Rivera I.N.G., Colwell RR.  2016.  Are natural reservoirs important for cholera surveillance? The case of an outbreak in a Brazilian estuary Letters in Applied Microbiology. (3):183-188.
Baker P, Ogale AS, Fermüller C.  2004.  The Argus eye: a new imaging system designed to facilitate robotic tasks of motion. IEEE Robotics & Automation Magazine. 11(4):31-38.
Baker P, Ogale AS, Fermüller C, Aloimonos Y.  2004.  The Argus eye, a new tool for robotics. IEEE Robotics and Automation Magazine. 11(4):31-38.
Haritaoglu I, Cozzi A, Koons D, Flickner M, Zotkin DN, Yacoob Y.  2001.  Attentive toys. International Conference on Multimedia and Expo. 22:25-25.
Ramachandran AV, Feamster N.  2008.  Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
Arbaugh WA, Keromytis AD, Farber DJ, Smith JM.  1998.  Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
Fleischmann KR, Oard D, Cheng AS, Wang P, Ishita E.  2009.  Automatic classification of human values: Applying computational thinking to information ethics. Proceedings of the American Society for Information Science and Technology. 46(1):1-4.
Oard D, DeClaris N, Dorr BJ, Faloutsos C.  1994.  On automatic filtering of multilingual texts. , 1994 IEEE International Conference on Systems, Man, and Cybernetics, 1994. 'Humans, Information and Technology'. 2:1645-1650vol.2-1645-1650vol.2.
Byrne W, Doermann D, Franz M, Gustman S, Hajic J, Oard D, Picheny M, Psutka J, Ramabhadran B.  2004.  Automatic recognition of spontaneous speech for access to multilingual oral history archives. IEEE Transactions on Speech and Audio Processing, Special Issue on Spontaneous Speech Processing. 12(4):420-435.
Furuta R, Plaisant C, Shneiderman B.  1989.  Automatically transforming regularly structured linear documents into hypertext.. Electronic Publishing. 2(4):211-229.
Wu D, Parsia B, Sirin E, Hendler J, Nau DS.  2003.  Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.
Sundaresan S, Lumezanu C, Feamster N, François P.  2010.  Autonomous Traffic Engineering using Self-Configuring Link Weights. GT-CS-10-16
Sundaresan S, Lumezanu C, Feamster N, François P.  2010.  Autonomous Traffic Engineering using Self-Configuring Link Weights. GT-CS-10-16
Sundaresan S, Lumezanu C, Feamster N, Francois P.  2010.  Autonomous traffic engineering with self-configuring topologies. SIGCOMM Comput. Commun. Rev.. 41(4):–-–.
Sundaresan S, Lumezanu C, Feamster N, Francois P.  2010.  Autonomous traffic engineering with self-configuring topologies. SIGCOMM Comput. Commun. Rev.. 41(4):–-–.
Sims JJ, Haririnia A, Dickinson BC, Fushman D, Cohen RE.  2009.  Avid interactions underlie the Lys63-linked polyubiquitin binding specificities observed for UBA domains. Nature Structural & Molecular Biology. 16(8):883-889.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
B
Rasko DA, Worsham PL, Abshire TG, Stanley ST, Bannan JD, Wilson MR, Langham RJ, Decker SR, Jiang L, Read TD et al..  2011.  Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation. Proceedings of the National Academy of SciencesPNAS. 108(12):5027-5032.
Hannenhalli S, Hayes WS, Hatzigeorgiou AG, Fickett JW.  1999.  Bacterial Start Site Prediction. Nucleic Acids ResearchNucl. Acids Res.. 27(17):3577-3582.
Froehlich J, Wobbrock JO, Kane SK.  2007.  Barrier pointing: using physical edges to assist target acquisition on mobile device touch screens. Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, October. :15-17.

Pages