Publications
Export 3364 results:
Author [ Title] Type Year Filters: First Letter Of Last Name is S [Clear All Filters]
2004. The priority curve algorithm for video summarization. Proceedings of the 2nd ACM international workshop on Multimedia databases. :28-35.
2009. Prioritizing component compatibility tests via user preferences. Software Maintenance, 2009. ICSM 2009. IEEE International Conference on. :29-38.
1996. Priorities for modeling and verifying distributed systems. Tools and Algorithms for the Construction and Analysis of Systems. :278-297.
2007. Principles for designing data-/compute-intensive distributed applications and middleware systems for heterogeneous environments. Journal of Parallel and Distributed Computing. 67(7):755-771.
2000. Previews and overviews in digital libraries: Designing surrogates to support visual information seeking. Journal of the American Society for Information Science. 51(4):380-393.
2004. Preserving distributed systems critical properties: a model-driven approach. Software, IEEE. 21(6):32-40.
2002. Presentation planning for distributed VoD systems. Knowledge and Data Engineering, IEEE Transactions on. 14(5):1059-1077.
1990. A preorder for partial process specifications. CONCUR'90 Theories of Concurrency: Unification and Extension. :141-151.
2000. Pre-Messenger RNA Processing Factors in the Drosophila Genome. The Journal of Cell BiologyJ Cell Biol. 150(2):F37-F44-F37-F44.
2005. Preliminary Study of the Turbulence Structure in Supersonic Boundary Layers using DNS Data. 35th AIAA Fluid Dynamics Conference.
1993. Preface to Sparks of Innovation in Human-Computer Interaction. Sparks of innovation in human-computer interaction.
2011. Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
1999. Predicting the CPU availability of time-shared Unix systems on the computational grid. The Eighth International Symposium on High Performance Distributed Computing, 1999. Proceedings. :105-112.
2008. Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology. :146-162.
1986. Preconditioning by Fast Direct Methods for Nonself-Adjoint Nonseparable Elliptic Equations. SIAM Journal on Numerical Analysis. 23(1):44-57.
2009. PrDB: managing and exploiting rich correlations in probabilistic databases. The VLDB Journal. 18(5):1065-1090.
1986. Practicality of non-interfering checkpoints in distributed database systems. IEEE Real-Time Systems Symposium, New Orleans, Louisiana. :234-241.