Publications

Export 1254 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Yilmaz C, Krishna AS, Memon AM, Porter A, Schmidt DC, Gokhale A, Natarajan B.  2005.  Main effects screening. Proceedings of the 27th international conference on Software engineering - ICSE '05. :293-293.
Cardone A, Gupta SK, Deshmukh A, Karnik M.  2006.  Machining feature-based similarity assessment algorithms for prismatic machined parts. Computer-Aided Design. 38(9):954-972.
L
Byrka J, Ghodsi M, Srinivasan A.  2010.  LP-rounding algorithms for facility-location problems. arXiv:1007.3611.
Gennaro R, Gertner Y, Katz J.  2003.  Lower bounds on the efficiency of encryption and digital signature schemes. Proceedings of the thirty-fifth annual ACM symposium on Theory of computing. :417-425.
Gennaro R, Gertner Y, Katz J.  2003.  Lower bounds on the efficiency of encryption and digital signature schemes. Proceedings of the thirty-fifth annual ACM symposium on Theory of computing. :417-425.
Ambainis A, Gasarch W, Srinivasan A, Utis A.  2006.  Lower Bounds on the Deterministic and Quantum Communication Complexities of Hamming-Distance Problems. Algorithms and ComputationAlgorithms and Computation. 4288:628-637.
Zotkin DN, Duraiswami R, Gumerov NA.  2010.  Loudspeaker and Microphone Array Signal Processing-Plane-Wave Decomposition of Acoustical Scenes Via Spherical and Cylindrical Microphone Arrays. IEEE transactions on audio, speech, and language processing. 20(1):2-2.
Grant J, Gryz J, Minker J, Raschid L.  2000.  Logic-based query optimization for object databases. IEEE Transactions on Knowledge and Data Engineering. 12(4):529-547.
Grant J, Gryz J, Minker J, Raschid L.  2000.  Logic-based query optimization for object databases. IEEE Transactions on Knowledge and Data Engineering. 12(4):529-547.
Grant J, Kraus S, Perlis D.  2005.  A logic-based model of intention formation and action for multi-agent subcontracting. Artificial Intelligence. 163(2):163-201.
Grant J, Minker J.  2002.  A logic-based approach to data integration. Theory Pract. Log. Program.. 2(3):323-368.
Grant J, Kraus S, Perlis D.  2000.  A logic for characterizing multiple bounded agents. Autonomous Agents and Multi-Agent Systems. 3(4):351-387.
Guo M, Mount SM.  1995.  Localization of Sequences Required for Size-specific Splicing of a SmallDrosophilaIntronin Vitro. Journal of Molecular Biology. 253(3):426-437.
Bulka B, Gaston M, desJardins M.  2007.  Local strategy learning in networked multi-agent team formation. Autonomous Agents and Multi-Agent Systems. 15(1):29-45.
Guo JK, Doermann D, Rosenfeld A.  1997.  Local correspondence for detecting random forgeries. Document Analysis and Recognition, 1997., Proceedings of the Fourth International Conference on. 1:319-323vol.1-319-323vol.1.
Sen P, Getoor L.  2007.  Link-based Classification. UMIACS-TR-2007-11
Getoor L.  2005.  Link-based classification. Advanced methods for knowledge discovery from complex data. :189-207.
Bilgic M, Getoor L.  2009.  Link-based active learning. NIPS Workshop on Analyzing Networks and Learning with Graphs.
Getoor L, Licamele L.  2005.  Link Mining for the Semantic Web, Position Statement. Proceedings of the Dagstuhl Seminar in Machine Learning for the Semantic Web.
Getoor L, Diehl CP.  2005.  Link mining: a survey. ACM SIGKDD Explorations Newsletter. 7(2):3-12.
Getoor L.  2003.  Link mining: a new data mining challenge. ACM SIGKDD Explorations Newsletter. 5(1):84-89.
Song Z, Ismael S, Grimes S, Doermann D, Strassel S.  2012.  Linguistic Resources for Handwriting Recognition and Translation Evaluation. Eight International Conference on Language Resources and Evaluation (LREC'12).
Zhou X, Garcia-Romero D, Duraiswami R, Espy-Wilson C, Shamma S.  2011.  Linear versus Mel Frequency Cepstral Coefficients for Speaker Recognition. IEEE Automatic Speech Recognition and Understanding Workshop.
Elman H, Golub GH.  1990.  Line iterative methods for cyclically reduced discrete convection-diffusion problems.
Groce A, Katz J, Yerukhimovich A.  2011.  Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.

Pages