Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Tikir MM, Hollingsworth J.  2005.  Efficient online computation of statement coverage. Journal of Systems and Software. 78(2):146-165.
Tikir MM, Hollingsworth J, Lueh G-Y.  2002.  Recompilation for debugging support in a JIT-compiler. Proceedings of the 2002 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering. :10-17.
Tighe S, Afshinnekoo E, Rock TM, McGrath K, Alexander N, McIntyre A, Ahsanuddin S, Bezdan D, Green SJ, Joye S et al..  2017.  Genomic Methods and Microbiological Technologies for Profiling Novel and Extreme Environments for the Extreme Microbiome Project (XMP). Journal of Biomolecular Techniques : JBT. 28(1):31-39.
Tian Y, Zhang Y, Hurd L, Hannenhalli S, Liu F, Lu M M, Morrisey EE.  2011.  Regulation of Lung Endoderm Progenitor Cell Behavior by miR302/367. DevelopmentDevelopment. 138(7):1235-1245.
Tian J, Zelkowitz MV.  1995.  Complexity measure evaluation and selection. Software Engineering, IEEE Transactions on. 21(8):641-650.
Tian J, Porter A, Zelkowitz MV.  1992.  An improved classification tree analysis of high cost modules based upon an axiomatic definition of complexity. Software Reliability Engineering, 1992. Proceedings., Third International Symposium on. :164-172.
Tian J, Zelkowitz MV.  1992.  A formal program complexity model and its application. Journal of Systems and Software. 17(3):253-266.
Thornber KK, Jacobs DW.  2005.  Torrance-sparrow off-specular reflection and linear subspaces for object recognition. 10/230,888(6900805)
Thornber KK, Jacobs DW.  2006.  Cast shadows and linear subspaces for object recognition. 10/085,750(7006684)
Thomas G, Shneiderman B.  1980.  Automatic database system conversion: A transformation language approach to sub-schema implementation. IEEE Computer Software and Applications Conference. :80-88.
Thomas J, Dearden A, Dray S, Light A, Best M, Arkin N, Maunder A, Kam M, Chetty M, Sambasivan N et al..  2008.  Hci for community and international development. SIGCHI EA '08. :3909-3912.
Thakur A, Banerjee A G, Gupta SK.  2009.  A survey of CAD model simplification techniques for physics-based simulation applications. Computer-Aided Design. 41(2):65-80.
Thakur A, Gupta SK.  2010.  A Computational Framework for Real-Time Unmanned Sea Surface Vehicle Motion Simulation. 3:51-61.
Thakur A, Gupta SK.  2011.  Real-time dynamics simulation of unmanned sea surface vehicle for virtual environments. Journal of Computing and Information Science in Engineering. 11:031005-031005.
Teo CL, Yang Y, Daumé H, Fermüller C, Aloimonos Y.  2011.  A Corpus-Guided Framework for Robotic Visual Perception. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Teng YA, Mount D, Puppo E, Davis LS.  1997.  Parallelizing and algorithm for visibility on polyhedral terrain. International Journal of Computational Geometry and Applications. 7(1/2):75-84.
Templeton TC, Fleischmann KR, Boyd-Graber J.  2011.  Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :734-737.
Templeton T C, Fleischmann KR, Boyd-Graber J.  2011.  Comparing values and sentiment using Mechanical Turk. Proceedings of the 2011 iConference. :783-784.
Teitler BE, Lieberman MD, Panozzo D, Sankaranarayanan J, Samet H, Sperling J.  2008.  NewsStand: a new view on news. Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems. :18:1–18:10-18:1–18:10.
Teich J, Bhattacharyya SS.  2004.  Analysis of dataflow programs with interval-limited data-rates. Computer Systems: Architectures, Modeling, and Simulation. :507-518.
Taylor EM, Grube NE, Martin, M.P.  2007.  Evaluation of Traditional and Shock-Confining LES Filters using DNS Data of Compressible Turbulence. Proceedings of 18th AIAA Computational Fluid Dynamics Conference.
Taylor M, Yin C-E, M. Wu, Qu G.  2008.  Extended abstract: A hardware-assisted data hiding based approach in building high performance secure execution systems. Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on. :93-96.
Taylor RW, Fry JP, Shneiderman B, Smith DCP, Su SYW.  1979.  Database Program Conversion: A Framework For Research. Fifth International Conference on Very Large Data Bases, 1979. :299-312.
Taylor EM, Martin, M.P, Smits AJ.  2005.  Preliminary Study of the Turbulence Structure in Supersonic Boundary Layers using DNS Data. 35th AIAA Fluid Dynamics Conference.
Taylor EM, Martin, M.P.  2007.  Stencil adaptation properties of a WENO scheme in direct numerical simulations of compressible turbulence. Journal of Scientific Computing. 30(3):533-554.

Pages