Publications

Export 927 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Wu Y, Raschid L.  2009.  ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
Kianzad V, Saha S, Schlessman J, Aggarwal G, Bhattacharyya SS, Wolf W, Chellappa R.  2005.  An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.
Saha S, Kianzad V, Schlessman J, Aggarwal G, Bhattacharyya SS, Chellappa R, Wolf W.  2009.  An architectural level design methodology for smart camera applications. International Journal of Embedded Systems. 4(1):83-97.
Pal P, Rubel P, Atighetchi M, Webber F, Sanders WH, Seri M, Ramasamy HG, Lyons J, Courtney T, Agbaria A et al..  2006.  An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Lerner MR, Boyle JA, Mount SM, Wolin SL, Steitz JA.  1980.  Are snRNPs involved in splicing? Nature. 283(5743):220-224.
Mount D, Silverman R, Wu A.  1993.  On the area of overlap of translated polygons. SPIE Vision Geometry II. 2060:254-264.
Mount D, Silverman R, Wu AY.  1998.  On the Area of Overlap of Translated Polygons. CS-TR-3201
Drury J, Resnik P, Weinberg A, Gennari S, Aoshima S.  2002.  Argument structure saturation in a constraint based model.
Wetzel J, Kingsford C, Pop M.  2011.  Assessing the benefits of using mate-pairs to resolve repeats in de novo short-read prokaryotic assemblies. BMC Bioinformatics. 12(1):95-95.
Wu M, Taylor EM, Martin, M.P.  2005.  Assessment of STBLI DNS data and comparison against experiments. AIAA paper.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2009.  An assessment of systems and software engineering scholars and institutions (2002–2006). Journal of Systems and Software. 82(8):1370-1373.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2008.  An assessment of systems and software engineering scholars and institutions (2001–2005). Journal of Systems and Software. 81(6):1059-1062.
Wong EW, Tse TH, Glass RL, Basili VR, Chen TY.  2011.  An assessment of systems and software engineering scholars and institutions (2003–2007 and 2004–2008). Journal of Systems and Software. 84(1):162-168.
Webber W, Oard D, Scholer F, Hedin B.  2010.  Assessor error in stratified evaluation. Proceedings of the 19th ACM international conference on Information and knowledge management. :539-548.
M. Wu, Liu B.  1999.  Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities. :10pp.-148-10pp.-148.
Fleischmann KR, Oard D, Cheng AS, Wang P, Ishita E.  2009.  Automatic classification of human values: Applying computational thinking to information ethics. Proceedings of the American Society for Information Science and Technology. 46(1):1-4.
Varshney A, Agarwal P, Brooks F, Wright W, Weber H.  1995.  Automatic generation of multiresolution for polygonal models. First Workshop on Simulation and Interaction in Virtual Environments.
Varshney A, Agarwal P, Brooks F, Wright W, Weber H.  1995.  Automatic generation of multiresolution for polygonal models. First Workshop on Simulation and Interaction in Virtual Environments.
Williams CC, Hollingsworth J.  2005.  Automatic Mining of Source Code Repositories to Improve Bug Finding Techniques. IEEE Transactions on Software Engineering. 31(6):466-480.
Hendler J, Nau DS, Parsia B, Sirin E, Wu D.  2006.  Automatic web services composition using Shop2.
Wu D, Parsia B, Sirin E, Hendler J, Nau DS.  2003.  Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
B
Rasko DA, Worsham PL, Abshire TG, Stanley ST, Bannan JD, Wilson MR, Langham RJ, Decker SR, Jiang L, Read TD et al..  2011.  Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation. Proceedings of the National Academy of SciencesPNAS. 108(12):5027-5032.

Pages