Publications

Export 1734 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Book Chapters
Minker J.  2000.  Introduction to logic-based artificial intelligence. Logic-based artificial intelligenceLogic-based artificial intelligence. :3-33.
O'Leary DP.  1993.  Iterative Methods for Finding the Stationary Vector for Markov Chains. Linear Algebra, Markov Chains, and Queuing ModelsLinear Algebra, Markov Chains, and Queuing Models. 48:125-136.
Plaisant C, Mushlin R, Snyder A, Li J, Heller D, Shneiderman B.  2003.  LifeLines: Using Visualization to Enhance Navigation and Analysis of Patient Records. The Craft of Information VisualizationThe Craft of Information Visualization. :308-312.
Cook D, Faber V, Marathe M, Srinivasan A, Sussmann Y.  1998.  Low-bandwidth routing and electrical power networks. Automata, Languages and ProgrammingAutomata, Languages and Programming. 1443:604-615.
Dorr BJ, Olive J, McCary J, Christianson C.  2011.  Machine Translation Evaluation and Optimization. Handbook of Natural Language Processing and Machine TranslationHandbook of Natural Language Processing and Machine Translation. :745-843.
Dorr BJ, Olive J, McCary J, Christianson C.  2011.  Machine Translation Evaluation and Optimization. Handbook of Natural Language Processing and Machine TranslationHandbook of Natural Language Processing and Machine Translation. :745-843.
Khan Z, Balch T, Dellaert F.  2004.  An MCMC-Based Particle Filter for Tracking Multiple Interacting Targets. Computer Vision - ECCV 2004. :279-290.
Mount SM.  1993.  Messenger RNA splicing signals in Drosophila genes. Atlas of Drosophila Genes. :333-358.
Eaton E, desJardins M, Lane T.  2008.  Modeling Transfer Relationships Between Learning Tasks for Improved Inductive Transfer. Machine Learning and Knowledge Discovery in DatabasesMachine Learning and Knowledge Discovery in Databases. 5211:317-332.
Rust BW, O'Leary DP, Mullen KM.  2010.  Modelling Type 1a Supernova Light Curves. Exponential Data Fitting and Its ApplicationsExponential Data Fitting and Its Applications. :169-186.
Hicks MW, Kakkar P, Moore J, Gunter C, Nettles S.  1999.  Network Programming Using PLAN. Internet Programming LanguagesInternet Programming Languages. 1686:127-143.
Mount D, Netanyahu NS, Ratanasanya S.  2010.  New Approaches to Robust, Point-Based Image Registration. Image Registration for Remote SensingImage Registration for Remote Sensing.
Papamanthou C, Tamassia R, Triandopoulos N.  2010.  Optimal Authenticated Data Structures with Multilinear Forms. Pairing-Based Cryptography - Pairing 2010. :246-264.
Dachman-Soled D, Lee HK, Malkin T, Servedio RA, Wan A, Wee H.  2008.  Optimal Cryptographic Hardness of Learning Monotone Functions. Automata, Languages and Programming. :36-47.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
Marchionini G, Plaisant C, Komlodi A.  2003.  The people in digital libraries: Multifaceted approaches to assessing needs and impact. Digital library use: Social practice in design and evaluationDigital library use: Social practice in design and evaluation. :119-160.
Monahemi M, Barlow J, O'Leary DP.  1992.  On the Precise Loop Transfer Recovery and Transmission Zeroes. First IEEE Conference on Control ApplicationsFirst IEEE Conference on Control Applications.
Udrea O, Yu D, Hung E, Subrahmanian V.  2005.  Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.
Memon AM.  2005.  A process and role-based taxonomy of techniques to make testable COTS components. Testing Commercial-Off-The-Shelf Components And SystemsTesting Commercial-Off-The-Shelf Components And Systems. :109-140.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2009.  Simple, Black-Box Constructions of Adaptively Secure Protocols. Theory of Cryptography. :387-402.
Kaâniche M, Kanoun K, Cukier M, Martini M.  1994.  Software reliability analysis of three successive generations of a Switching System. Dependable Computing — EDCC-1. 852:471-490.
O'Leary DP.  1995.  The SVD in Image Restoration. SVD and Signal Processing III: Algorithms, Architectures, and ApplicationsSVD and Signal Processing III: Algorithms, Architectures, and Applications. :315-322.
Memon AM.  2009.  TESTING EVENT-DRIVEN SOFTWARE–THE NEXT QA CHALLENGE? Software Engineering and DevelopmentSoftware Engineering and Development. :187-187.

Pages