Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Chu D, Deshpande A, Hellerstein JM, Hong W.  2006.  Approximate Data Collection in Sensor Networks using Probabilistic Models. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. :48-48.
Cole R, Vishkin U.  1986.  Approximate and exact parallel scheduling with applications to list, tree and graph problems. 27th Annual Symposium on Foundations of Computer Science. :478-491.
Srinivasan A.  2003.  On the approximability of clique and related maximization problems. Journal of Computer and System Sciences. 67(3):633-651.
Tanin E, Samet H.  2002.  APPOINT: an Approach for Peer-to-Peer Offloading the INTernet. Proceedings of the 2002 annual national conference on Digital government research. :1-7.
Das R, Hwang YS, Uysal M, Saltz J, Sussman A.  1993.  Applying the CHAOS/PARTI library to irregular problems in computational chemistry and computational aerodynamics. Scalable Parallel Libraries Conference, 1993., Proceedings of the. :45-56.
Condon E, Cukier M, He T.  2007.  Applying Software Reliability Models on Security Incidents. :159-168.
Cummings MP, Myers DS, Mangelson M.  2004.  Applying permutation tests to tree-based statistical models: extending the R package rpart. 2004-24
Krishna AS, Yilmaz C, Memon AM, Porter A, Schmidt DC, Gokhale A, Natarajan B.  2004.  Applying Model-based Distributed Continuous Quality Assurance Processes to Enhance Persistent Software Attributes. IEEE Software. 21(6):32-40.
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
Fraser T, Petroni J., Arbaugh WA.  2006.  Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
Iseki O, Shneiderman B.  1986.  Applying direct manipulation concepts: direct manipulation dik operating system (DMDOS). SIGSOFT Softw. Eng. Notes. 11(2):22-26.
Madnani N, Resnik P, Dorr BJ, Schwartz R.  2008.  Applying automatically generated semantic knowledge: A case study in machine translation. NSF Symposium on Semantic Knowledge Discovery, Organization and Use.
Doermann D, Rivlin E, Weiss I.  1996.  Applying algebraic and differential invariants for logo recognition. Machine Vision and Applications. 9(2):73-86.
Rose A, Shneiderman B, Plaisant C.  1995.  An applied ethnographic method for redesigning user interfaces. Proceedings of the 1st conference on Designing interactive systems: processes, practices, methods, & techniques. :115-122.
Katz J, Yung M.  2007.  Applied cryptography and network security: 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007: proceedings. 4521
Minter J, Perlis D.  1984.  Applications or Protected Circumscription. 7th International Conference on Automated Deduction, Napa, California, USA, May 14-16, 1984: proceedings. 170:414-414.
Nau DS, Au T-C, Ilghami O, Kuter U, Wu D, Yaman F, Munoz-Avila H, Murdock JW.  2005.  Applications of SHOP and SHOP2. Intelligent Systems, IEEE. 20(2):34-41.
Papamanthou C, Tollis IG.  2006.  Applications of Parameterized st-Orientations in Graph Drawing Algorithms. Graph Drawing. :355-367.
Papamanthou C, Tollis IG.  2010.  Applications of Parameterized st-Orientations. Journal of Graph Algorithms and Applications. 14(2):337-365.
Ran Y, Zheng Q, Chellappa R, Strat TM.  2010.  Applications of a Simple Characterization of Human Gait in Surveillance. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 40(4):1009-1020.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Applications and implications. Readings in information visualization. :625-635.
Bai P, Prabhakaran B, Srinivasan A.  1999.  Application-layer broker for scalable Internet services with resource reservation. Proceedings of the seventh ACM international conference on Multimedia (Part 2). :103-106.
Josyula DP, Fults S, Anderson ML, Wilson S, Perlis D.  2007.  Application of MCL in a dialog agent. Third Language and Technology Conference.
Regli WC, Gupta SK, Nau DS.  1994.  An Application of Distributed Solid Modeling: Feature Recognition. ISR; TR 1994-82
Cárdenas SR, Tian J, Zelkowitz MV.  1992.  An application of decision theory for the evaluation of software prototypes. Journal of Systems and Software. 19(1):27-39.

Pages