Publications

Export 292 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Bierman G, Hicks MW, Sewell P, Stoyle G.  2003.  Formalizing dynamic software updating. Proceedings of the Second International Workshop on Unanticipated Software Evolution (USE).
Ramasamy HV, Cukier M, Sanders WH.  2003.  Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
Ramasamy HV, Cukier M, Sanders WH.  2002.  Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
Weissman A, Gupta SK, Fiorentini X, Sudarsan R, Sriram R.  2009.  Formal Representation of Product Design Specifications for Validating Product Design. :1411-1422.
Tian J, Zelkowitz MV.  1992.  A formal program complexity model and its application. Journal of Systems and Software. 17(3):253-266.
Ray A, Cleaveland R.  2004.  Formal Modeling Of Middleware-based Distributed Systems. Electronic Notes in Theoretical Computer Science. 108:21-37.
Reggia JA, Nau DS, Wang PY, Peng Y.  1985.  A formal model of diagnostic inference, II. Algorithmic solution and application. Information Sciences. 37(1-3):257-285.
Reggia JA, Nau DS, Wang P, Peng Y.  1985.  A formal model of abductive inference. Information Sciences. 37:227-285.
Grant J, Kraus S, Perlis D.  2005.  Formal approaches to teamwork. We Will Show Them: Essays in Honour of Dov Gabbay. 1:39-68.
Tse C, Krafft C, Mayergoyz ID, McAvoy P, Tseng C-Y.  2005.  Forensic recovery of hard disk data by using the spin-stand imaging technique. Proceedings of SPIE. 5778(1):595-606.
Lu W, Varna AL, Wu M.  2010.  Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.
Zhao HV, M. Wu, Wang ZJ, Liu KJR.  2005.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Image Processing, IEEE Transactions on. 14(5):646-661.
Paluska, Saff, Yeh, Chen.  2003.  Footloose: a case for physical eventual consistency and selective conflict resolution. Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on. :170-179.
Ma H, Doermann D.  2005.  Font identification using the grating cell texture operator. SPIE Conference on Document Recogntion and Retreival XXII. :148-156.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
Gumerov NA, Duraiswami R.  2006.  FMM accelerated BEM for 3D Laplace & Helmholtz equations. Proceedings Int. Conf. on Boundary Element Techniques.
Snover M, Madnani N, Dorr BJ, Schwartz R.  2009.  Fluency, adequacy, or HTER?: exploring different human judgments with a tunable MT metric Proceedings of the Fourth Workshop on Statistical Machine Translation. :259-268.
Foster JS, Terauchi T, Aiken A.  2002.  Flow-sensitive type qualifiers. ACM SIGPLAN Notices. 37(5):1-12.
Foster JS, Johnson R, Kodumal J, Aiken A.  2006.  Flow-insensitive type qualifiers. ACM Transactions on Programming Languages and Systems (TOPLAS). 28(6):1035-1087.
Consolvo S, Klasnja P, McDonald DW, Avrahami D, Froehlich J, LeGrand L, Libby R, Mosher K, Landay JA.  2008.  Flowers or a robot army?: encouraging awareness & activity with personal, mobile displays Proceedings of the 10th international conference on Ubiquitous computing. :54-63.
Nassi I, Shneiderman B.  1973.  Flowchart techniques for structured programming. ACM SIGPLAN Notices. 8(8):12-26.
Khuller S, Naor J.  1994.  Flow in planar graphs with vertex capacities. Algorithmica. 11(3):200-225.
Van Horn D, Mairson HG.  2008.  Flow Analysis, Linearity, and PTIME. Static Analysis. :255-269.
Condon A, Deshpande A, Hellerstein L, Wu N.  2006.  Flow algorithms for two pipelined filter ordering problems. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :193-202.
Deshpande A, Hellerstein L.  2008.  Flow Algorithms for Parallel Query Optimization. IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008. :754-763.

Pages