Publications
Export 1435 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is K [Clear All Filters]
2003. The people in digital libraries: Multifaceted approaches to assessing needs and impact. Digital library use: Social practice in design and evaluationDigital library use: Social practice in design and evaluation. :119-160.
2001. Perceptual organization as generic object recognition. From Fragments to Objects Segmentation and Grouping in VisionFrom Fragments to Objects Segmentation and Grouping in Vision. Volume 130:295-329.
2009. Planning for Interactions among Autonomous Agents. Programming Multi-Agent Systems. 5442:1-23.
2003. Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
2003. Planning in Answer Set Programming Using Ordered Task Decomposition. KI 2003: Advances in Artificial Intelligence. 2821:490-504.
2004. PRAM-On-Chip: A Quest for Not-So-Obvious Non-obviousness. Mathematical Foundations of Computer Science 2004Mathematical Foundations of Computer Science 2004. 3153:104-105.
2004. PRAM-On-Chip: A Quest for Not-So-Obvious Non-obviousness. Mathematical Foundations of Computer Science 2004Mathematical Foundations of Computer Science 2004. 3153:104-105.
2007. Probabilistic Relational Models. Introduction to Statistical Relational LearningIntroduction to Statistical Relational Learning. :129-129.
2007. Randomized Algorithms and Probabilistic Analysis in Wireless Networking. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. 4665:54-57.
1993. Remote direct manipulation: A case study of a telemedicine workstation. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :51-51.
2000. Resource-aware meta-computing. Emphasizing Distributed SystemsEmphasizing Distributed Systems. Volume 53:109-169.
2012. Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
2003. Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
2003. Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
2005. Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
2012. Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
2003. Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
1994. Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
1994. Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
2011. Speeding Up Network Layout and Centrality Measures for Social Computing Goals. Social Computing, Behavioral-Cultural Modeling and PredictionSocial Computing, Behavioral-Cultural Modeling and Prediction. 6589:244-251.
2006. A Step Towards Automated Design of Side Actions in Injection Molding of Complex Parts. Geometric Modeling and Processing - GMP 2006. 4077:500-513.
1989. A support tool for teaching computer programming. Issues in software engineering educationIssues in software engineering education. :139-167.
2003. Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
2000. Using Feature Hierarchies in Bayesian Network Learning. Abstraction, Reformulation, and Approximation. 1864:260-270.