Publications

Export 538 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Cole R, Vishkin U.  1986.  Approximate scheduling, exact scheduling, and applications to parallel algorithms. Proceedings Symposium on Foundations of Computer Science. :478-491.
Colwell RR.  2003.  ANNUAL REVIEW & FORECAST REPORTS-THE OCEANS: TO PROTECT AND TO PLOW. Sea Technology. 44(1):33-34.
Condon E, Cukier M, He T.  2007.  Applying Software Reliability Models on Security Incidents. :159-168.
Condon A, Deshpande A, Hellerstein L, Wu N.  2009.  Algorithms for distributional and adversarial pipelined filter ordering problems. ACM Trans. Algorithms. 5(2):24:1–24:34-24:1–24:34.
Condon E, He A, Cukier M.  2008.  Analysis of Computer Security Incident Data Using Time Series Models. :77-86.
Consolvo S, McDonald DW, Toscos T, Chen MY, Froehlich J, Harrison B, Klasnja P, LaMarca A, LeGrand L, Libby R et al..  2008.  Activity sensing in the wild: a field trial of ubifit garden. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1797-1806.
Costello L, Grinstein G, Plaisant C, Scholtz J.  2009.  Advancing User-Centered Evaluation of Visual Analytic Environments Through Contests. Information VisualizationInformation Visualization. 8(3):230-238.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Cummings MP, Myers DS, Mangelson M.  2004.  Applying permutation tests to tree-based statistical models: extending the R package rpart. 2004-24
Cuntoor NP, Yegnanarayana B, Chellappa R.  2008.  Activity Modeling Using Event Probability Sequences. Image Processing, IEEE Transactions on. 17(4):594-607.
D
Dachman-Soled D, Malkin T, Raykova M, Venkitasubramaniam M.  2013.  Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments. Advances in Cryptology - ASIACRYPT 2013. :316-336.
Das D, Gupta SK, Regli WC, Nau DS.  1995.  Automated Manufacturability Analysis: A Survey. ISR; TR 1995-14
Das R, Hwang YS, Uysal M, Saltz J, Sussman A.  1993.  Applying the CHAOS/PARTI library to irregular problems in computational chemistry and computational aerodynamics. Scalable Parallel Libraries Conference, 1993., Proceedings of the. :45-56.
Davis LS, Roussopoulos N.  1980.  Approximate pattern matching in a pattern database system. Information Systems. 5(2):107-119.
Dean TL, ALLEN JAMES AUTOR, Aloimonos Y.  1995.  Artificial Intelligence: Theory and Practice. :604.
Demaine ED, Hajiaghayi MT, Kawarabayashi K.  2005.  Algorithmic graph minor theory: Decomposition, approximation, and coloring. Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on. :637-646.
Demner-Fushman D, Jimmy Lin.  2007.  Answering Clinical Questions with Knowledge-Based and Statistical Techniques. Computational Linguistics. 33(1):63-103.
Deshpande A, Ives Z, Raman V.  2007.  Adaptive query processing. Foundations and Trends in Databases. 1(1):1-140.
Deshpande A, Ives Z, Raman V.  2007.  Adaptive query processing: why, how, when, what next? Proceedings of the 33rd international conference on Very large data bases. :1426-1427.
Dhaliwal S, Gupta SK, Huang J, Priyadarshini A.  2003.  Algorithms for computing global accessibility cones. Journal of Computing and Information Science in Engineering. 3:200-200.
Diehl S, Diehl F, El-Sayed NM, Clayton C, Hoheisel JD.  2002.  Analysis of stage-specific gene expression in the bloodstream and the procyclic form of Trypanosoma brucei using a genomic DNA-microarray. Molecular and Biochemical Parasitology. 123(2):115-123.
Dix J, Kraus S, V.S. Subrahmanian.  2002.  Agents dealing with time and uncertainty. Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2. :912-919.
Doermann D, Rivlin E, Weiss I.  1996.  Applying algebraic and differential invariants for logo recognition. Machine Vision and Applications. 9(2):73-86.
Doermann D, Sauvola J, Haapakoski S, Kauniskangas H, Seppanen T, Pietikainen M.  1997.  ADistributed Management System for Testing Document Image Database Analysis Algorithms. ICDAR. :989-995.
Don A, Brennan S, Laurel B, Shneiderman B.  1992.  Anthropomorphism: from Eliza to Terminator 2. Proceedings of the SIGCHI conference on Human factors in computing systems. :67-70.

Pages