Publications

Export 1435 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Conference Papers
Hicks MW, Jagannathan S, Kelsey R, Moore JT, Ungureanu C.  1999.  Transparent communication for distributed objects in Java. Proceedings of the ACM 1999 conference on Java Grande. :160-170.
Hicks B, King D, McDaniel P, Hicks MW.  2006.  Trusted declassification:: high-level policy for a security-typed language. Proceedings of the 2006 workshop on Programming languages and analysis for security. :65-74.
Morselli R, Bhattacharjee B, Katz J, Keleher P.  2004.  Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
Morselli R, Bhattacharjee B, Katz J, Keleher P.  2004.  Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
Kim Y-S, Dagalakis NG, Gupta SK.  2011.  A Two Degree of Freedom Nanopositioner With Electrothermal Actuator for Decoupled Motion. :447-457.
Froehlich J, Dillahunt T, Klasnja P, Mankoff J, Consolvo S, Harrison B, Landay JA.  2009.  UbiGreen: investigating a mobile tool for tracking and supporting green transportation habits. Proceedings of the 27th international conference on Human factors in computing systems. :1043-1052.
Nagarajan N, Kingsford C.  2008.  Uncovering Genomic Reassortments among Influenza Strains by Enumerating Maximal Bicliques. IEEE International Conference on Bioinformatics and Biomedicine, 2008. BIBM '08. :223-230.
Kelly W, Pugh W.  1995.  A unifying framework for iteration reordering transformations. Algorithms and Architectures for Parallel Processing, 1995. ICAPP 95. IEEE First ICA/sup 3/PP., IEEE First International Conference on. 1:153-162.
Horvitz O, Katz J.  2007.  Universally-composable two-party computation in two rounds. Proceedings of the 27th annual international cryptology conference on Advances in cryptology. :111-129.
Kumar J, Doermann D.  2013.  Unsupervised Classification of Structurally Similar Document Images. International Conference on Document Analysis and Recognition.
Ye P, Kumar J, Kang L, Doermann D.  2012.  Unsupervised Feature Learning Framework for No-reference Image Quality Assessment. CVPR.
Ye P, Kumar J, Kang L, Doermann D.  2012.  Unsupervised Feature Learning Framework for No-reference Image Quality Assessment. CVPR.
Khadilkar M, Feamster N, Sanders M, Clark R.  2007.  Usage-based dhcp lease time optimization. Proceedings of the 7th ACM SIGCOMM conference on Internet measurement. :71-76.
Kuo K-T, Phuvoravan S, Bhattacharjee B, Jun La R, Shayman M, Chang H S.  2003.  On the use of flow migration for handling short-term overloads. Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE. 6:3108-3112vol.6-3108-3112vol.6.
Kim J, Oard D, Romanik K.  2001.  User modeling for information access based on implicit feedback. 3rd Symposium of ISKO-France, Information Filtering and Automatic Summarisation in networds.
Cheng KL, Zuckerman I, Kuter U, Nau DS.  2010.  Using a Social Orientation Model for the Evolution of Cooperative Societies. :431-438.
Kuter U, Nau DS.  2005.  Using domain-configurable search control for probabilistic planning. 20:1169-1169.
Kandogan E, Shneiderman B.  1998.  Using elastic windows for World-Wide Web Browsing. CHI 98 conference summary on Human factors in computing systems. :189-190.
Nau DS, Gupta SK, Kramer TR, Regli WC, Zhang G.  1993.  Using MRSEVs to develop machining alternatives.
Snelick R, JaJa JF, Kacker R, Lyon G.  1993.  Using Synthetic-Perturbation Techniques for Tuning Shared Memory Programs. Parallel Processing, 1993. ICPP 1993. International Conference on. 2:2-10.
Lerman K, Getoor L, Minton S, Knoblock C.  2004.  Using the structure of Web sites for automatic segmentation of tables. Proceedings of the 2004 ACM SIGMOD international conference on Management of data. :119-130.
Schwartz M, Gupta SK, Anand DK, Brough JE, Kavetsky R.  2007.  Using virtual demonstrations for creating multi-media training instructions.
Klasnja P, Harrison BL, LeGrand L, LaMarca A, Froehlich J, Hudson SE.  2008.  Using wearable sensors and real time inference to understand human recall of routine activities. Proceedings of the 10th international conference on Ubiquitous computing. :154-163.
Elgot-drapkin J, Kraus S, Miller M, Nirkhe M, Perlis D.  1993.  Vacuum-logic. Proceedings of AAAI 1993 Fall Symposium Series: Instantiating Real-World Agents. :51-54.
Grinstein G, Konecni S, Scholtz J, Whiting M, Plaisant C.  2010.  VAST 2010 Challenge: Arms dealings and pandemics. Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on. :263-264.

Pages