Publications

Export 337 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is T  [Clear All Filters]
2007
Papamanthou C, Tamassia R.  2007.  Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Information and Communications Security. :1-15.
Khuller S, Malekian A, Mestre J.  2007.  To fill or not to fill: the gas station problem. Algorithms–ESA 2007. :534-545.
Boyd-Graber J, Blei D, Zhu X.  2007.  A topic model for word sense disambiguation. Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL). :1024-1033.
Hui A, De Floriani L.  2007.  Topological Decompositions for 3D Non-manifold Simplicial Shapes. CS-TR-4855
Anderson ML, Schmill M, Oates T, Perlis D, Josyula D, Wright D, Wilson S.  2007.  Toward domain-neutral human-level metacognition. AAAI Spring Symposium on Logical Formalizations of Commonsense Reasoning.
Hicks MW, Swamy N, Tsang S.  2007.  Toward Specifying and Validating Cross-Domain Policies. Technical Reports from UMIACS.
Plishker W, Dandekar O, Bhattacharyya SS, Shekhar R.  2007.  Towards a heterogeneous medical image registration acceleration platform. Biomedical Circuits and Systems Conference, 2007. BIOCAS 2007. IEEE. :231-234.
Papaleo L, De Floriani L, Hendler J, Hui A.  2007.  Towards a semantic web system for understanding real world representations. Proceedings of the Tenth International Conference on Computer Graphics and Artificial Intelligence.
Vishkin U.  2007.  Towards Realizing a PRAM-On-Chip Vision. Workshop on Highly Parallel Processing on a Chip (HPPC). 28
Brough J, Schwartz M, Gupta SK, Anand D, Kavetsky R, Pettersen R.  2007.  Towards the development of a virtual environment-based training system for mechanical assembly operations. Virtual Reality. 11(4):189-206.
Mao Y, Wu M.  2007.  Tracing malicious relays in cooperative wireless communications. Information Forensics and Security, IEEE Transactions on. 2(2):198-212.
Madnani N, Jimmy Lin, Dorr BJ.  2007.  TREC 2007 ciQA Task: University of Maryland. Proceedings of TREC.
Singh LN, Wang L-S, Hannenhalli S.  2007.  TREMOR—a tool for retrieving transcriptional modules by incorporating motif covariance. Nucleic Acids Research. 35(21):7360-7371.
Albanese M, V.S. Subrahmanian.  2007.  T-rex: A domain-independent system for automated cultural information extraction. Proceedings of the First International Conference on Computational Cultural Dynamics (ICCCD 2007).
Hui A, De Floriani L.  2007.  A two-level topological decomposition for non-manifold simplicial shapes. Proceedings of the 2007 ACM symposium on Solid and physical modeling. :355-360.
Greenfieldboyce D, Foster JS.  2007.  Type qualifier inference for Java. ACM SIGPLAN Notices. 42:321-336.
2006
Parhi P, Karlson AK, Bederson BB.  2006.  Target size study for one-handed thumb use on small touchscreen devices. Proceedings of the 8th conference on Human-computer interaction with mobile devices and services. :203-210.
Lee B, Plaisant C, Parr C S, Fekete J-D, Henry N.  2006.  Task taxonomy for graph visualization. Proceedings of the 2006 AVI workshop on BEyond time and errors: novel evaluation methods for information visualization. :1-5.
Lim S-N, Mittal A, Davis LS.  2006.  Task-Driven Video Collection. Technical Reports from UMIACS.
Porter A, Yilmaz C, Memon AM, Krishna AS, Schmidt DC, Gokhale A.  2006.  Techniques and processes for improving the quality and performance of open-source software. Software Process: Improvement and Practice. 11(2):163-176.
Shneiderman B.  2006.  A telescope for high-dimensional data. Computing in Science & Engineering. 8(2):48-53.
Perlis D.  2006.  Theory and Application of Self-Reference: Logic and Beyond. Self-reference. 178:121-121.
Piatetsky-Shapiro G, Grossman R, Djeraba C, Feldman R, Getoor L, Zaki M.  2006.  Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
Zhuolin Jiang, Li S-F, Gao D-F.  2006.  A Time Saving Method for Human Detection in Wide Angle Camera Images. Machine Learning and Cybernetics, 2006 International Conference on. :4029-4034.
Shet VD, Harwood D, Davis LS.  2006.  Top-down, bottom-up multivalued default reasoning for identity maintenance. Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks. :79-86.

Pages