Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Reports
V.S. Subrahmanian.  2003.  Optimizing Heavily Loaded Agents.
Bederson BB, Shneiderman B, Wattenberg M.  2005.  Ordered and Quantum Treemaps: Making Effective Use of 2D Space to Display Hierarchies (2001). Institute for Systems Research Technical Reports.
Stewart G.W.  1999.  On Orthogonalization in the Inverse Power Method. UMIACS-TR-99-64
Elaine Shi, Stoica I, Andersen DG, Perrig A.  2006.  OverDoSe: A generic DDoS protection service using an overlay network.
Ramachandran A, Bhandankar K, Tariq MB, Feamster N.  2008.  Packets with provenance. GT-CS-08-02
Okun O, Doermann D, Pietikainen M.  1999.  Page Segmentation and Zone Classification: The State of the Art. LAMP-TR-036,CAR-TR-927,CS-TR-4079
Bader DA, JaJa JF.  1998.  Parallel Algorithms for Image Histogramming and Connected Components with an Experimental Study. UMIACS-TR-94-133
JaJa JF, Shi Q, Varshney A.  2008.  Parallel Algorithms for Volumetric Surface Construction.
Chang S-C, JaJa JF.  1988.  Parallel Algorithms for Wiring Module Pins to Frame Pads.
Elman H, Howle VE, Shadid J, Tuminaro R.  2002.  A Parallel Block Multi-level Preconditioner for the 3D Incompressible Navier--Stokes Equations. UMIACS-TR-2002-95
Varshney A.  1991.  Parallel radiosity techniques for mesh-connected SIMD computers.
Helman DR, Bader DA, JaJa JF.  1998.  A Parallel Sorting Algorithm With an Experimental Study. UMIACS-TR-95-102
Smorul M, JaJa JF, Wang Y, McCall F.  2004.  PAWN: Producer-Archive Workflow Network in support of digital preservation. UMIACS-TR-2004:2006-2006.
Fermüller C.  1995.  Perception of 3D Motion through Patterns of Visual Motion..
Stewart G.W.  1998.  On the Perturbation of LU, Cholesky, and QR Factorizations. UMIACS-TR-92-24
Stewart G.W.  1995.  On the perturbation of Schur complement in positive semidefinite matrix. TR-95-38
Stewart G.W.  1998.  Perturbation Theory for the Singular Value Decomposition. UMIACS-TR-90-124
Broadwater J, Chellappa R.  2006.  Physics-Based Detectors Applied to Long-Wave Infrared Hyperspectral Data.
Hicks MW.  1998.  PLAN Security System. Technical Reports (CIS).
Mundada Y, Ramachandran A, Tariq MB, Feamster N.  2011.  Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks. GT-CS-11-01
Elman H.  1981.  Preconditioned Conjugate-Gradient Methods for Nonsymmetric Systems of Linear Equations..
Elman H.  2001.  Preconditioners for Saddle Point Problems Arising in Computational Fluid Dynamics. UMIACS-TR-2001-88
Licamele L, Getoor L.  2007.  Predicting Protein-Protein Interactions Using Relational Features. CS-TR-4909
Dorr BJ.  1987.  Principle-Based Parsing for Machine Translation.
Vishkin U.  1998.  Project for Developing Computer Science Agenda(s) for High-Performance Computing: An Organizer's Summary. UMIACS-TR-94-129

Pages