Publications

Export 383 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Hsu C-J, Pino J L, Bhattacharyya SS.  2011.  Multithreaded Simulation for Synchronous Dataflow Graphs. ACM Trans. Des. Autom. Electron. Syst.. 16(3):25:1-25:23.
Hsiao HC, Studer A, Dubey R, Elaine Shi, Perrig A.  2011.  Efficient and secure threshold-based event validation for vanets.
Hovemeyer D, Pugh W.  2004.  Finding bugs is easy. ACM SIGPLAN NoticesSIGPLAN Not.. 39(12):92-92.
Hovemeyer D, Spacco J, Pugh W.  2005.  Evaluating and tuning a static analysis to find null pointer bugs. Proceedings of the 6th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. :13-19.
Hovemeyer D, Pugh W.  2004.  Finding concurrency bugs in java. Proceedings of the PODC Workshop on Concurrency and Synchronization in Java Programs, St. John's, Newfoundland, Canada.
Hovemeyer D, Pugh W, Spacco J.  2006.  Atomic instructions in java. ECOOP 2002—Object-Oriented Programming. :5-16.
Hovemeyer D, Pugh W.  2001.  More efficient network class loading through bundling. Proceedings of the 2001 Symposium on Java TM Virtual Machine Research and Technology Symposium-Volume 1. :17-17.
Hovemeyer D, Hollingsworth J, Bhattacharjee B.  2004.  Running on the bare metal with GeekOS. Proceedings of the 35th SIGCSE technical symposium on Computer science education. :315-319.
Housley R, Arbaugh WA.  2003.  WLAN problems and solutions. Communications of the ACM. 46(5):31-34.
Hourigan SK, Subramanian P, Hasan NA, Ta A, Klein E, Chettout N, Huddleston K, Deopujari V, Levy S, Baveja R et al..  2018.  Comparison of Infant Gut and Skin Microbiota, Resistome and Virulome Between Neonatal Intensive Care Unit (NICU) Environments. Frontiers in Microbiology.
Hourcade JP, Bederson BB, Druin A.  2004.  Building KidPad: an application for children's collaborative storytelling. Software: Practice and Experience. 34(9):895-914.
Hourcade JP, Bederson BB, Druin A.  2004.  Preschool children's use of mouse buttons. CHI'04 extended abstracts on Human factors in computing systems. :1411-1412.
Hourcade J P, Bullock-Rest NE, Friedman B, Nelson M, Shneiderman B, Zaphiris P.  2011.  HCI for peace: from idealism to concrete steps. PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :613-616.
Hourcade JP, Bederson BB, Druin A, Rose A, Farber A, Takayama Y.  2003.  The International Children's Digital Library: viewing digital books online. Interacting with Computers. 15(2):151-167.
Hourcade JP, Bederson BB, Druin A, Guimbretiere F.  2003.  Accuracy, Target Reentry and Fitts’ Law Performance of Preschool Children Using Mice. University of Maryland Technical Report, HCIL-2003. 16
Hotho A, Sure Y, Getoor L.  2004.  A workshop report: mining for and from the Semantic Web at KDD 2004. SIGKDD Explor. Newsl.. 6(2):142-143.
Hossain M, Alam M, Khaleque A, Islam S, Sadique A, Khan N, Halim Z, Sarker M, El-Sayed NM, Huq A et al..  2018.  Virulence-Related Genes Identified from the Genome Sequence of the Non-O1/Non-O139 Vibrio cholerae Strain VcN1, Isolated from Dhaka, Bangladesh. Genome Announcements. (10)
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
Horvitz O, Katz J.  2010.  Bounds on the efficiency of black-box commitment schemes. Theoretical Computer Science. 411(10):1251-1260.
Horvitz O, Katz J, Koo CY, Morselli R.  2004.  Reducing complexity assumptions for statistically-hiding commitment. In EUROCRYPT.
Horvitz E, Getoor L, Guestrin C, Hendler J, Kautz H, Konstan J, Subramanian D, Wellman M.  2010.  REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):87-87.
Horvitz O, Katz J.  2007.  Universally-composable two-party computation in two rounds. Proceedings of the 27th annual international cryptology conference on Advances in cryptology. :111-129.
Horvitz O, Katz J.  2005.  Bounds on the efficiency of black-box commitment schemes. Automata, Languages and Programming. :62-62.
Horprasert T, Yacoob Y, Davis LS.  1996.  Computing 3-D head orientation from a monocular image sequence. Automatic Face and Gesture Recognition, 1996., Proceedings of the Second International Conference on. :242-247.
Hornbaek K, Bederson BB, Plaisant C.  2003.  Navigation patterns & usability of zoomable user interfaces: with and without an overview. interactions. 10(1):11-12.

Pages