Publications

Export 1389 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
Conference Papers
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
Oard D, Demner-Fushman D, Hajic J, Ramabhadran B, Gustman S, Byrne WJ, Soergel D, Dorr BJ, Resnik P, Picheny M.  2002.  Automatic transcription of Czech language oral history in the MALACH project: resources and initial experiments. Proceedings of the The 5th International Conference on Text, Speech and Dialogue. :57-64.
Patel VM, Nasrabadi NM, Chellappa R.  2010.  Automatic target recognition based on simultaneous sparse representation. Image Processing (ICIP), 2010 17th IEEE International Conference on. :1377-1380.
Gu R, Piat J, Raulet M, Janneck JW, Bhattacharyya SS.  2010.  Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP). :265-272.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Papamanthou C, Tamassia R, Triandopoulos N.  2008.  Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
Zotkin DN, Keleher PJ, Perkovic D.  2000.  Attacking the bottlenecks of backfilling schedulers. Cluster Computing.
Kraus S, Perlis D.  1989.  Assessing others' knowledge and ignorance. Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems.
Varshavsky A, Chen MY, de Lara E, Froehlich J, Haehnel D, Hightower J, LaMarca A, Potter F, Sohn T, Tang K et al..  2005.  Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A.  2011.  Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A.  2011.  Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J.  2011.  Applying graphics processor acceleration in a software defined radio prototyping environment. 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP). :67-73.
Fraser T, Petroni J., Arbaugh WA.  2006.  Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
Rose A, Shneiderman B, Plaisant C.  1995.  An applied ethnographic method for redesigning user interfaces. Proceedings of the 1st conference on Designing interactive systems: processes, practices, methods, & techniques. :115-122.
Minter J, Perlis D.  1984.  Applications or Protected Circumscription. 7th International Conference on Automated Deduction, Napa, California, USA, May 14-16, 1984: proceedings. 170:414-414.
Bai P, Prabhakaran B, Srinivasan A.  1999.  Application-layer broker for scalable Internet services with resource reservation. Proceedings of the seventh ACM international conference on Multimedia (Part 2). :103-106.
Josyula DP, Fults S, Anderson ML, Wilson S, Perlis D.  2007.  Application of MCL in a dialog agent. Third Language and Technology Conference.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW.  1997.  Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. Software Engineering, International Conference on. :14-14.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.

Pages