Publications
Export 383 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is H [Clear All Filters]
2007. Efficient simulation of critical synchronous dataflow graphs. ACM Transactions on Design Automation of Electronic Systems (TODAES). 12(3):1-28.
2001. More efficient network class loading through bundling. Proceedings of the 2001 Symposium on Java TM Virtual Machine Research and Technology Symposium-Volume 1. :17-17.
2004. Running on the bare metal with GeekOS. Proceedings of the 35th SIGCSE technical symposium on Computer science education. :315-319.
2005. Evaluating and tuning a static analysis to find null pointer bugs. Proceedings of the 6th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. :13-19.
2004. Finding concurrency bugs in java. Proceedings of the PODC Workshop on Concurrency and Synchronization in Java Programs, St. John's, Newfoundland, Canada.
2018. Comparison of Infant Gut and Skin Microbiota, Resistome and Virulome Between Neonatal Intensive Care Unit (NICU) Environments. Frontiers in Microbiology.
2003. Accuracy, Target Reentry and Fitts’ Law Performance of Preschool Children Using Mice. University of Maryland Technical Report, HCIL-2003. 16
2011. HCI for peace: from idealism to concrete steps. PART 2 ———– Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems. :613-616.
2004. Building KidPad: an application for children's collaborative storytelling. Software: Practice and Experience. 34(9):895-914.
2004. Preschool children's use of mouse buttons. CHI'04 extended abstracts on Human factors in computing systems. :1411-1412.
2003. The International Children's Digital Library: viewing digital books online. Interacting with Computers. 15(2):151-167.
2004. A workshop report: mining for and from the Semantic Web at KDD 2004. SIGKDD Explor. Newsl.. 6(2):142-143.
2018. Virulence-Related Genes Identified from the Genome Sequence of the Non-O1/Non-O139 Vibrio cholerae Strain VcN1, Isolated from Dhaka, Bangladesh. Genome Announcements. (10)
2007. Universally-composable two-party computation in two rounds. Proceedings of the 27th annual international cryptology conference on Advances in cryptology. :111-129.
2005. Bounds on the efficiency of black-box commitment schemes. Automata, Languages and Programming. :62-62.
2010. AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
2010. Bounds on the efficiency of black-box commitment schemes. Theoretical Computer Science. 411(10):1251-1260.
2010. REPORTS AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):87-87.
1996. Computing 3-D head orientation from a monocular image sequence. Automatic Face and Gesture Recognition, 1996., Proceedings of the Second International Conference on. :242-247.
2003. Navigation patterns & usability of zoomable user interfaces: with and without an overview. interactions. 10(1):11-12.