Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Bessière K, Newhagen JE, Robinson JP, Shneiderman B.  2006.  A model for computer frustration: the role of instrumental and dispositional factors on incident, session, and post-session frustration and mood. Computers in Human Behavior. 22(6):941-961.
Bethencourt J, Elaine Shi, Song D.  2010.  Signatures of Reputation. Financial Cryptography and Data Security. 6052:400-407.
Bethencourt J, Chan H, Perrig A, Elaine Shi, Song D.  2006.  Anonymous multi-attribute encryption with range query and conditional decryption.
Beynon MD, Kurc T, Sussman A, Saltz J.  2000.  Design of a Framework for Data-Intensive Wide-Area Applications. Heterogeneous Computing Workshop. :116-116.
Beynon MD, Sussman A, Saltz J.  1999.  Performance impact of proxies in data intensive client-server applications. Proceedings of the 13th international conference on Supercomputing. :383-390.
Beynon MD, Sussman A, Kurc T, Catalyurek U, Saltz J.  2002.  Efficient Manipulation of Large Datasets on Heterogeneous Storage Systems. Parallel and Distributed Processing Symposium, International. 2:0084-0084.
Beynon M, Ferreira R, Kurc T, Sussman A, Saltz J.  2000.  DataCutter: Middleware for filtering very large scientific datasets on archival storage systems. NASA conference publication. :119-134.
Beynon M, Chang C, Catalyurek U, Kurc T, Sussman A, Andrade H, Ferreira R, Saltz J.  2002.  Processing large-scale multi-dimensional data in parallel and distributed environments. Parallel Computing. 28(5):827-859.
Beynon MD, Sussman A, Catalyurek U, Kurc T, Saltz J.  2001.  Performance optimization for data intensive grid applications. Active Middleware Services, 2001. Third Annual International Workshop on. :97-105.
Beynon MD, Kurc T, Catalyurek U, Chang C, Sussman A, Saltz J.  2001.  Distributed processing of very large datasets with DataCutter. Parallel Computing. 27(11):1457-1478.
Beynon MD, Kurc T, Sussman A, Saltz J.  2002.  Optimizing execution of component-based applications using group instances. Future Generation Computer Systems. 18(4):435-448.
Bhanu B, Govindaraju V.  2011.  Face Tracking and Recognition in a Camera Network. Multibiometrics for Human IdentificationMultibiometrics for Human Identification.
Bhanu B, Ratha NK, Kumar V, Chellappa R, Bigun J.  2007.  Guest Editorial: Special Issue on Human Detection and Recognition. Information Forensics and Security, IEEE Transactions on. 2(3):489-490.
Bhat G, Cleaveland R, L\üttgen G.  1999.  A practical approach to implementing real-time semantics. Annals of Software Engineering. 7(1):127-155.
Bhat G, Cleaveland R.  1996.  Efficient local model-checking for fragments of the modal $\mu$-calculus. Tools and Algorithms for the Construction and Analysis of Systems. :107-126.
Bhat G, Cleaveland R.  1996.  Efficient model checking via the equational μ-calculus. , Eleventh Annual IEEE Symposium on Logic in Computer Science, 1996. LICS '96. Proceedings. :304-312.
Bhat G, Cleaveland R, Grumberg O.  1995.  Efficient on-the-fly model checking for CTL. , Tenth Annual IEEE Symposium on Logic in Computer Science, 1995. LICS '95. Proceedings. :388-397.
Bhat GS, Cleaveland R, Groce A.  2001.  Efficient Model Checking Via Buchi Tableau Automata⋆. Computer aided verification: 13th International conference, CAV 2001, Paris, France, July 18-22, 2001: proceedings. 2102:38-38.
Bhat G, Cleaveland R, L\üttgen G.  1997.  Dynamic priorities for modeling real-time. Proc. of the Formal Description Techniques and Protocol Specification, Testing and Verification (FORTE X/PSTV XVII’97). :321-336.
Bhatia M, Chi P, Chong W, Josyula DP, Okamoto Y, Perlis D, Purang K.  2001.  Handling uncertainty with active logic. In Proceedings, AAAI Fall Symposium on Uncertainty in Computation.
Bhatia S, Motiwala M, Muhlbauer W, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Hosting virtual networks on commodity hardware. GT-CS-07-10
Bhatia S, Motiwala M, Muhlbauer W, Mundada Y, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
Bhatia R, Khuller S, Naor J(S).  2000.  The Loading Time Scheduling Problem. Journal of Algorithms. 36(1):1-33.
Bhattacharjee B, Chawathe S, Gopalakrishnan V, Keleher P, Silaghi B.  2003.  Efficient peer-to-peer searches using result-caching. Peer-to-Peer Systems II. :225-236.
Bhattacharjee B, Rodrigues R, Kouznetsov P.  2007.  Secure lookup without (constrained) flooding. WRAITS 2007.

Pages