Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Bessiere K, Ceaparu I, Lazar J, Robinson J, Shneiderman B.  2004.  Social and psychological influences on computer user frustration. Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use. :91-103.
Bethencourt J, Chan H, Perrig A, Elaine Shi, Song D.  2006.  Anonymous multi-attribute encryption with range query and conditional decryption.
Bethencourt J, Elaine Shi, Song D.  2010.  Signatures of Reputation. Financial Cryptography and Data Security. 6052:400-407.
Beynon MD, Sussman A, Kurc T, Catalyurek U, Saltz J.  2002.  Efficient Manipulation of Large Datasets on Heterogeneous Storage Systems. Parallel and Distributed Processing Symposium, International. 2:0084-0084.
Beynon M, Ferreira R, Kurc T, Sussman A, Saltz J.  2000.  DataCutter: Middleware for filtering very large scientific datasets on archival storage systems. NASA conference publication. :119-134.
Beynon M, Chang C, Catalyurek U, Kurc T, Sussman A, Andrade H, Ferreira R, Saltz J.  2002.  Processing large-scale multi-dimensional data in parallel and distributed environments. Parallel Computing. 28(5):827-859.
Beynon MD, Sussman A, Catalyurek U, Kurc T, Saltz J.  2001.  Performance optimization for data intensive grid applications. Active Middleware Services, 2001. Third Annual International Workshop on. :97-105.
Beynon MD, Kurc T, Catalyurek U, Chang C, Sussman A, Saltz J.  2001.  Distributed processing of very large datasets with DataCutter. Parallel Computing. 27(11):1457-1478.
Beynon MD, Kurc T, Sussman A, Saltz J.  2002.  Optimizing execution of component-based applications using group instances. Future Generation Computer Systems. 18(4):435-448.
Beynon MD, Kurc T, Sussman A, Saltz J.  2000.  Design of a Framework for Data-Intensive Wide-Area Applications. Heterogeneous Computing Workshop. :116-116.
Beynon MD, Sussman A, Saltz J.  1999.  Performance impact of proxies in data intensive client-server applications. Proceedings of the 13th international conference on Supercomputing. :383-390.
Bhanu B, Ratha NK, Kumar V, Chellappa R, Bigun J.  2007.  Guest Editorial: Special Issue on Human Detection and Recognition. Information Forensics and Security, IEEE Transactions on. 2(3):489-490.
Bhanu B, Govindaraju V.  2011.  Face Tracking and Recognition in a Camera Network. Multibiometrics for Human IdentificationMultibiometrics for Human Identification.
Bhat G, Cleaveland R, L\üttgen G.  1999.  A practical approach to implementing real-time semantics. Annals of Software Engineering. 7(1):127-155.
Bhat G, Cleaveland R.  1996.  Efficient local model-checking for fragments of the modal $\mu$-calculus. Tools and Algorithms for the Construction and Analysis of Systems. :107-126.
Bhat G, Cleaveland R.  1996.  Efficient model checking via the equational μ-calculus. , Eleventh Annual IEEE Symposium on Logic in Computer Science, 1996. LICS '96. Proceedings. :304-312.
Bhat G, Cleaveland R, Grumberg O.  1995.  Efficient on-the-fly model checking for CTL. , Tenth Annual IEEE Symposium on Logic in Computer Science, 1995. LICS '95. Proceedings. :388-397.
Bhat GS, Cleaveland R, Groce A.  2001.  Efficient Model Checking Via Buchi Tableau Automata⋆. Computer aided verification: 13th International conference, CAV 2001, Paris, France, July 18-22, 2001: proceedings. 2102:38-38.
Bhat G, Cleaveland R, L\üttgen G.  1997.  Dynamic priorities for modeling real-time. Proc. of the Formal Description Techniques and Protocol Specification, Testing and Verification (FORTE X/PSTV XVII’97). :321-336.
Bhatia S, Motiwala M, Muhlbauer W, Mundada Y, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
Bhatia R, Khuller S, Naor J(S).  2000.  The Loading Time Scheduling Problem. Journal of Algorithms. 36(1):1-33.
Bhatia M, Chi P, Chong W, Josyula DP, Okamoto Y, Perlis D, Purang K.  2001.  Handling uncertainty with active logic. In Proceedings, AAAI Fall Symposium on Uncertainty in Computation.
Bhatia S, Motiwala M, Muhlbauer W, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Hosting virtual networks on commodity hardware. GT-CS-07-10
Bhattacharjee B, Rabinovich M.  2010.  Overlay Networking and Resiliency. Guide to Reliable Internet Services and Applications. :221-251.
Bhattacharjee B, Calvert K, Griffioen J, Spring N, Sterbenz JPG.  2006.  Postmodern internetwork architecture. ITTC-FY2006-TR-45030-01, Information and Telecommunication Center, The University of Kansas.

Pages