Export 7150 results:
Author Title [ Type(Desc)] Year
Liu X, Doermann D.  2008.  Computer Vision and Image Processing Techniques for Mobile Application. LAMP-TR-151
Kao TC, Mount D.  1991.  Computing generalized Voronoi diagrams in improved time and space bounds.
Aloimonos Y.  1986.  Computing Intrinsic Images..
Dorr BJ, Voss C.  1992.  Constraining MT divergences: spatial relations in the lexicon and knowledge base.
Dorr BJ, Gaasterland T.  2002.  Constraints on the Generation of Tense, Aspect, and Connecting Words from Temporal Expressions.
Wei Z, JaJa JF.  2011.  Constructing Inverted Files on a Cluster of Multicore Processors Near Peak I/O Throughput. UMIACS-TR-2011-03
Wei Z, JaJa JF.  2012.  Constructing Inverted Files: To MapReduce or Not Revisited. UMIACS-TR-2012-03
Dorr BJ, Lin D, Levow G-A.  2002.  Construction of a Chinese-English Verb Lexicon for Embedded Machine Translation in Cross-Language Information Retrieval.
Levow GA, Dorr BJ, Lin D.  2000.  Construction of Chinese-English Semantic Hierarchy for Information Retrieval.
Perlis D, Purang K.  1998.  Conversational Adequacy: Mistakes are the Essence. UMIACS-TR-96-41
Kang H, Roussopoulos N.  1987.  On Cost-effectiveness of a Semijoin in Distributed Query Processing.. ISR-TR-1987-38
Lee W, Dagon D, Giffin J, Feamster N, Ollman G, Westby J, Wesson R, Vixie P.  2011.  Countering Botnets: Anomaly-Based Detection, Comprehensive Analysis, and Efficient Mitigation.
Basili VR, Dangle K, Esker L, Marotta F, Rus I, Brosgol BM, Jamin S, Arthur JD, Ravichandar R, Wisnosky DE.  2008.  CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 10, October 2008.
Gupta SK, Das D, Regli WC, Nau DS.  1995.  Current Trends and Future Challenges in Automated Manufacturability Analysis. ISR; TR 1995-16
Shen C-C, Plishker W, Bhattacharyya SS.  2011.  Dataflow-based Design and Implementation of Image Processing Applications. Technical Reports from UMIACS.
Bhattacharyya SS, Shen C-C, Plishker W, Sane N, Wu H-H, Gu R.  2011.  Dataflow-Based Implementation of Layered Sensing Applications.
Minker J.  1995.  Deductive Databases and Knowledge Base Systems..
Miller M, Perlis D, Purang K.  1998.  Defaults Denied. UMIACS-TR-96-61
De Floriani L, Fellegara R, Magillo P.  2010.  Design, Analysis and Comparison of Spatial Indexes for Tetrahedral Meshes. DISI-TR-2010-05
Lychev R, Feamster N.  2009.  Designing Enforceable Network Contracts. GT-CS-09-02
Shneiderman B, Plaisant C, Botafogo R, Hopkins D, Weiland W.  1998.  Designing to facilitate browsing: A look back at the Hyperties workstation browser. Technical Reports of the Computer Science Department, University of Maryland.
Ceaparu I, Lazar J, Bessiere K, Robinson J, Shneiderman B.  2005.  Determining Causes and Severity of End-User Frustration (2002). Institute for Systems Research Technical Reports.
Medem A, Teixeira R, Feamster N, Meulle M.  2009.  Determining the causes of intradomain routing changes.
Aloimonos Y, Basu A.  1986.  Determining the Translation of a Rigidly Moving Surface, without Correspondence,.
Kavetsky R, Gupta SK.  2010.  Developing Autonomy for Unmanned Surface Vehicles by Using Virtual Environments.