Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Y
Yilmaz C, Porter A, Krishna AS, Memon AM, Schmidt DC, Gokhale AS, Natarajan B.  2007.  Reliable Effects Screening: A Distributed Continuous Quality Assurance Process for Monitoring Performance Degradation in Evolving Software Systems. Software Engineering, IEEE Transactions on. 33(2):124-141.
Yilmaz C, Krishna AS, Memon AM, Porter A, Schmidt DC, Gokhale A, Natarajan B.  2005.  Main effects screening: a distributed continuous quality assurance process for monitoring performance degradation in evolving software systems. Proceedings of the 27th international conference on Software engineering. :293-302.
Yilmaz C, Memon AM, Porter A, Krishna AS, Schmidt DC, Gokhale A, Natarajan B.  2004.  Preserving distributed systems critical properties: a model-driven approach. Software, IEEE. 21(6):32-40.
Yilmaz C, Porter A, Schmidt DC.  2003.  Distributed continuous quality assurance: The Skoll project. Workshop on Remote Analysis and Measurement of Software Systems (RAMSS).
Yin P, M. Wu, Liu B.  2000.  Video transcoding by reducing spatial resolution. Image Processing, 2000. Proceedings. 2000 International Conference on. 1:972-975vol.1-972-975vol.1.
Yin P, Wu M, Liu B.  2002.  A robust error resilient approach for MPEG video transmission over internet. Visual Communication and Image Processing, SPIE. 4671:103-111.
Yoon K, Harwood D, Davis LS.  2006.  Appearance-based person recognition using color/path-length profile. Journal of Visual Communication and Image Representation. 17(3):605-622.
Yoon I-C, Sussman A, Porter A.  2005.  And away we go: understanding the complexity of launching complex HPC applications. Proceedings of the second international workshop on Software engineering for high performance computing system applications. :45-49.
Yoon I, Sussman A, Memon AM, Porter A.  2011.  Towards incremental component compatibility testing. Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering, CBSE. 11:119-128.
Yoon K, DeMenthon D, Doermann D.  2000.  Event Detection from MPEGVideo in the Compressed Domain. ICPR. :819-822.
Yoon I-C, Sussman A, Memon AM, Porter A.  2009.  Prioritizing component compatibility tests via user preferences. Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. :29-38.
Yoon I-C, Sussman A, Memon AM, Porter A.  2008.  Effective and scalable software compatibility testing. Proceedings of the 2008 international symposium on Software testing and analysis. :63-74.
Yoon I-C, Sussman A, Memon AM, Porter A.  2007.  Direct-dependency-based software compatibility testing. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :409-412.
Young D, Shneiderman B.  1993.  A graphical filter/flow representation of Boolean queries: A prototype implementation and evaluation. Journal of the American Society for Information Science. 44(6):327-339.
Young D, Shneiderman B.  1992.  A Graphical Filter/flow Representation of Boolean Queries: A Prototype Implementation.
Young-Myers H, Raschid L.  1993.  Transitive closure: an experimental case study of three multithreaded database algorithms on a shared memory multiprocessor. Parallel and Distributed Information Systems, 1993., Proceedings of the Second International Conference on. :255-259.
Youngmyers H, Raschid L.  1993.  An Experimental Study of Three Dataflow Paradigms in Multithreaded Database Transitive Closure Algorithms on Shared Memory Multiprocessors. Journal of Parallel and Distributed Computing. 18(3):371-389.
Youssef A, Shneiderman B.  2002.  Media Conversion from Visual to Audio: Voice Browsers. Technical Reports of the Computer Science Department.
Youssef MA, Agrawala AK, Shankar UA, Noh SH.  2002.  A Probabilistic Clustering-Based Indoor Location Determination System. Technical Reports from UMIACS, UMIACS-TR-2002-30.
Yu X, Li Y, Fermüller C, Doermann D.  2007.  Object Detection Using Shape Codebook. British Machine Vision Conference (BMVC'07).
Yu M, Rexford J, Sun X, Rao S, Feamster N.  2011.  A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.
Yu Z, Seng CY, Jiang T, Wu X, Arbaugh WA.  2005.  Robust routing in malicious environment for ad hoc networks. Information Security Practice and Experience. :36-47.
Yu X, Fermüller C, Teo C L, Yang Y, Aloimonos Y.  2011.  Active scene recognition with vision and language. 2011 IEEE International Conference on Computer Vision (ICCV). :810-817.
Yu S-S, Kolagotla RK, JaJa JF.  1992.  VLSI Architectures and Implementation of Predictive Tree- Searched Vector Quantizers for Real-Time Video Compression. ISR-TR-1992-48
Yu H H, M. Wu, Li X, Gelman AD.  2002.  Methods and apparatus for multi-layer data hiding. : 09/427,321(6456726)

Pages