Publications

Export 344 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Gannon J, Basili VR, Zelkowitz MV, Yeh R.  1985.  Research in Programming Languages and Software Engineering..
Garay JA, Katz J, Koo C-Y, Ostrovsky R.  2007.  Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.
Gerdes JW, Gupta SK, Wilkerson SA.  2010.  A Review of Bird-Inspired Flapping Wing Miniature Air Vehicle Designs. 2:57-67.
Ghanem N, DeMenthon D, Doermann D, Davis LS.  2004.  Representation and Recognition of Events in Surveillance Video Using Petri Nets. Second IEEEWorkshop on Event Mining 2004, CVPR2004. :112-112.
Gilsinn DE, Cheok GS, O'Leary DP.  2002.  Reconstructing Images of Bar Codes for Construction Site Object Recognition. Proceedings of the 19th International Symposium on Automation and Robotics in Construction.
Gilsinn DE, Cheok GS, O'Leary DP.  2004.  Reconstructing Images of Bar Codes for Construction Site Object Recognition. Automation in Construction (Elsevier). 13:21-35.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2006.  Ranking search results in peer-to-peer systems. Technical Reports from UMIACS.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2006.  Ranking search results in P2P systems. Technical Report, CR-TR-4779, Department of Computer Science, University of Maryland.
Gordon S, Katz J.  2006.  Rational secret sharing, revisited. Security and Cryptography for Networks. :229-241.
Gou H, Swaminathan A, Wu M.  2007.  Robust scanner identification based on noise features. Proc. SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. 6505:0S–0T-0S–0T.
Gou H, Wu M.  2005.  Robust digital fingerprinting for curves. Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'05). 2:529-532.
Grim CJ, Zo Y-G, Hasan NA, Ali A, Chowdhury WB, Islam A, Rashid MH, Alam M, Morris GJ, Huq A et al..  2009.  RNA Colony Blot Hybridization Method for Enumeration of Culturable Vibrio Cholerae and Vibrio Mimicus Bacteria. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(17):5439-5444.
Grossman D, Morrisett G, Jim T, Hicks MW, Wang Y, Cheney J.  2002.  Region-based memory management in cyclone. SIGPLAN Not.. 37(5):282-293.
Gumerov NA.  2000.  Rectified Heat Transfer to Vapor Bubbles in Standing Acoustic Waves. Microgravity fluid physics and heat transfer: proceedings of the International Conference on Microgravity Fluid Physics and Heat Transfer held at the Tutle Bay Hilton, Oahu, Hawaii, September 19-24, 1999. :96-96.
Gumerov NA, Duraiswami R.  2004.  Recursions for the computation of multipole translation and rotation coefficients for the 3-D Helmholtz equation. SIAM Journal on Scientific Computing. 25(4):1344-1381.
Gurer D, desJardins M, Schlager M.  1995.  Representing a student’s learning states and transitions. American Association of Artificial Intelligence Spring Symposium on Representing Mental States and Mechanisms.
H
Haitner I, Horvitz O, Katz J, Koo CY, Morselli R, Shaltiel R.  2009.  Reducing complexity assumptions for statistically-hiding commitment. Journal of cryptology. 22(3):283-310.
Haitner I, Horvitz O, Katz J, Koo CY, Morselli R, Shaltiel R.  2005.  Reducing complexity assumptions for statistically-hiding commitment. Advances in Cryptology–EUROCRYPT 2005. :614-614.
Han B, Davis LS.  2005.  Robust observations for object tracking. Image Processing, 2005. ICIP 2005. IEEE International Conference on. 2:II-442-5-II-442-5.
Hansen P C, O'Leary DP.  1997.  Regularization algorithms based on total least squares. Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996)Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996). :127-137.

Pages