Publications

Export 620 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Triandopoulos N, Goodrich MT, Papamanthou C, Tamassia R.  2008.  Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science. :80-96.
Papamanthou C, Tamassia R, Triandopoulos N.  2008.  Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
Papamanthou C, Tamassia R, Triandopoulos N.  2008.  Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities. :10pp.-148-10pp.-148.
Ghallab M, Nau DS, Traverso P.  2004.  Automated Planning: Theory and Practice.
Thomas G, Shneiderman B.  1980.  Automatic database system conversion: A transformation language approach to sub-schema implementation. IEEE Computer Software and Applications Conference. :80-88.
Shneiderman B, Thomas G.  1982.  Automatic database system conversion: schema revision, data translation, and source-to-source program transformation. Proceedings of the June 7-10, 1982, national computer conference. :579-587.
Tabatabaee V, Hollingsworth J.  2007.  Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
B
Koren S, Treangen TJ, Pop M.  2011.  Bambus 2: scaffolding metagenomes. Bioinformatics. 27(21):2964-2971.
Fomin EDDFV, Hajiaghayi MT, Thilikos DM.  2004.  Bidimensional Parameters and Local Treewidth. Latin 2004: Theoretical Informatics: 6th Latin American Symposium, Buenos Aires, Argentina, April 5-8, 2004: Proceedings. :109-109.
Elman H, Howle VE, Shadid J, Shuttleworth R, Tuminaro R.  2006.  Block preconditioners based on approximate commutators. SIAM Journal on Scientific Computing. 27(5):1651-1668.
Zhang Z, Klassen E, Srivastava A, Turaga P, Chellappa R.  2011.  Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
Gopalan R, Taheri S, Turaga P, Chellappa R.  2012.  A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
Gopalan R, Taheri S, Turaga P, Chellappa R.  2012.  A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
Gennaro R, Gertner Y, Katz J, Trevisan L.  2005.  Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing. 35(1):217-217.
Sundaresan S, de Donato W, Feamster N, Teixeira R, Crawford S, Pescapè A.  2011.  Broadband internet performance: A view from the gateway. SIGCOMM-Computer Communication Review. 41(4):134-134.
Tanin E, Plaisant C, Shneiderman B.  2003.  Broadening Access to Large Online Databases by Generalizing Query Previews. The Craft of Information VisualizationThe Craft of Information Visualization. :31-37.
Tanin E, Plaisant C, Shneiderman B.  2005.  Broadening Access to Large Online Databases by Generalizing Query Previews (2000). Institute for Systems Research Technical Reports.
Cummings MP, Temple GG.  2010.  Broader incorporation of bioinformatics in education: opportunities and challenges. Brief Bioinform. 11(537-543)
Tanin E, Shneiderman B, Xie H.  2007.  Browsing large online data tables using generalized query previews. Information Systems. 32(3):402-423.
Tanin E, Shneiderman B.  2005.  Browsing Large Online Data Tables Using Generalized Query Previews (2001). Institute for Systems Research Technical Reports.
Basili VR, Tesoriero R, Costa P, Lindvall M, Rus I, Shull F, Zelkowitz MV.  2001.  Building an Experience Base for Software Engineering: A report on the first CeBASE eWorkshop. Product Focused Software Process Improvement. :110-125.
Tsui C, Wang P, Fleischmann KR, Sayeed AB, Weinberg A.  2010.  Building an IT Taxonomy with Co-occurrence Analysis, Hierarchical Clustering, and Multidimensional Scaling.
Tanin E, Harwood A, Samet H, Nayar D, Nutanong S.  2006.  Building and querying a P2P virtual world. Geoinformatica. 10(1):91-116.

Pages