Publications

Export 1734 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Conference Papers
Citrin W, Halbert D, Hewitt C, Meyrowitz N, Shneiderman B.  1993.  Potentials and limitations of pen-based computers. Proceedings of the 1993 ACM conference on Computer science. :536-539.
Mount D, Netanyahu NS, Romanik K, Silverman R, Wu AY.  1997.  A practical approximation algorithm for the LMS line estimator. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :473-482.
Moore JT, Hicks MW, Nettles S.  2001.  Practical programmable packets. IEEE INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 1:41-50vol.1-41-50vol.1.
Miner D, desJardins M.  2009.  Predicting and Controlling System-Level Parameters of Multi-Agent Systems. 2009 AAAI Fall Symposium Series.
Martin, M.P.  2005.  Preliminary Study of the SGS Time Scales for Compressible Boundary Layers using DNS Data. 43rd AIAA Aerospace Sciences Meeting and Exhibit.
Taylor EM, Martin, M.P, Smits AJ.  2005.  Preliminary Study of the Turbulence Structure in Supersonic Boundary Layers using DNS Data. 35th AIAA Fluid Dynamics Conference.
Miller M, Perlis D.  1993.  Presentations and this and that: logic in action. Proceedings of the 15th Annual Conference of the Cognitive Science Society, Boulder, Colorado. 251
Yoon I-C, Sussman A, Memon AM, Porter A.  2009.  Prioritizing component compatibility tests via user preferences. Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. :29-38.
Mashima D, Elaine Shi, Chow R, Sarkar P, Li C, Song D.  2011.  Privacy settings from contextual attributes: A case study using Google Buzz. :257-262.
Yeh RT, Mittermeir R, Roussopoulos N, Reed J.  1984.  A Programming Environment Framework Based on Reusability. Proceedings of the First International Conference on Data Engineering. :277-280.
Marchionini G, Haas S, Shneiderman B, Plaisant C, Hert CA.  2004.  Project highlight: toward the statistical knowledge network. Proceedings of the 2004 annual national conference on Digital government research. :125:1–125:2-125:1–125:2.
Minker J, Perlis D.  1984.  Protected circumscription. Proc. Workshop on Non-Monotonic Reasoning. :337-343.
Mendonça Neto MG, Seaman C, Basili VR, Kim YM.  2001.  A prototype experience management system for a software consulting organization. Thirteenth International Conference on Software Engineering and Knowledge Engineering. :29-36.
Jimmy Lin, Madnani N, Dorr BJ.  2010.  Putting the user in the loop: interactive Maximal Marginal Relevance for query-focused summarization. Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :305-308.
Vidal M E, Raschid L, Marquez N, Cardenas M, Wu Y.  2006.  Query Rewriting in the Semantic Web7. Data Engineering Workshops, 22nd International Conference on. :7-7.
Mitchell JSB, Mount D, Suri S.  1994.  Query-sensitive ray shooting. Proceedings of the tenth annual symposium on Computational geometry. :359-368.
Mitchell JSB, Mount D, Suri S.  1994.  Query-sensitive ray shooting. Proceedings of the tenth annual symposium on Computational geometry. :359-368.
Alaei S, Malekian A, Srinivasan A.  2009.  On random sampling auctions for digital goods. Proceedings of the 10th ACM conference on Electronic commerce. :187-196.
Arya S, Mount D, Smid M.  1994.  Randomized and deterministic algorithms for geometric spanners of small diameter. Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on. :703-712.
Wang L, Metzler D, Jimmy Lin.  2010.  Ranking under temporal constraints. Proceedings of the 19th ACM international conference on Information and knowledge management. :79-88.
Xie Q, Memon AM.  2005.  Rapid "crash testing" for continuously evolving GUI-based software applications. Software Maintenance, 2005. ICSM'05. Proceedings of the 21st IEEE International Conference on. :473-482.
Morimoto C, Yacoob Y, Davis LS.  1996.  Recognition of head gestures using hidden markov models. Pattern Recognition, 1996., Proceedings of the 13th International Conference on. 3:461-465.
Horvitz O, Katz J, Koo CY, Morselli R.  2004.  Reducing complexity assumptions for statistically-hiding commitment. In EUROCRYPT.
De Floriani L, Magillo P.  2002.  Regular and irregular multi-resolution terrain models: a comparison. Proceedings of the 10th ACM international symposium on Advances in geographic information systems. :143-148.
Van Horn D, Mairson HG.  2007.  Relating Complexity and Precision in Control Flow Analysis. ICFP '07 Proceedings of the 12th ACM SIGPLAN International Conference on Functional Programming. :85-96.

Pages