Publications

Export 1435 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Kelly W, Pugh W, Rosser E, Shpeisman T.  1996.  Transitive closure of infinite graphs and its applications. Languages and Compilers for Parallel Computing. :126-140.
Valancius V, Kim H, Feamster N.  2010.  Transit portal: BGP connectivity as a service. ACM SIGCOMM Computer Communication Review. 40(4):463-464.
Kim J-S, Nam B, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2008.  Trade-offs in matching jobs and balancing load for distributed desktop grids. Future Generation Computer Systems. 24(5):415-424.
Kim J-S, Nam B, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2008.  Trade-offs in matching jobs and balancing load for distributed desktop grids. Future Generation Computer Systems. 24(5):415-424.
Kembhavi A, Farrell R, Luo Y, Jacobs DW, Duraiswami R, Davis LS.  2008.  Tracking Down Under: Following the Satin Bowerbird. Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on. :1-7.
Brough J, Schwartz M, Gupta SK, Anand D, Kavetsky R, Pettersen R.  2007.  Towards the development of a virtual environment-based training system for mechanical assembly operations. Virtual Reality. 11(4):189-206.
Dumitras T, Kerner S, M\uarculescu R.  2003.  Towards On-chip Fault-tolerant Communication. ASP-DAC '03 Proceedings of the 2003 Asia and South Pacific Design Automation Conference. :225-232.
Kale A, Chowdhury AKR, Chellappa R.  2003.  Towards a view invariant gait recognition algorithm. Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003.. :143-150.
Khalili A, Katz J, Arbaugh WA.  2003.  Toward secure key distribution in truly ad-hoc networks. Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on. :342-346.
Khalili A, Katz J, Arbaugh WA.  2003.  Toward secure key distribution in truly ad-hoc networks. Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on. :342-346.
Regier JC, Zwick A, Cummings MP, Kawahara AY, Cho S, Weller S, Roe A, Baixeras J, Brown JW, Parr C et al..  2009.  Toward reconstructing the evolution of advanced moths and butterflies (Lepidoptera: Ditrysia): an initial molecular study. BMC Evol Biol. 9:280-280.
Regier JC, Zwick A, Cummings MP, Kawahara AY, Cho S, Weller S, Roe A, Baixeras J, Brown JW, Parr C et al..  2009.  Toward reconstructing the evolution of advanced moths and butterflies (Lepidoptera: Ditrysia): an initial molecular study. BMC Evol Biol. 9:280-280.
Sears A, Kochavy Y, Shneiderman B.  1990.  Touchscreen field specification for public access database queries: let your fingers do the walking. Proceedings of the 1990 ACM annual conference on Cooperation. :1-7.
Sane N, Kee H, Seetharaman G, Bhattacharyya SS.  2011.  Topological Patterns for Scalable Representation and Analysis of Dataflow Graphs. Journal of Signal Processing Systems. 65(2):229-244.
Setiawan H, Kan MY, Li H, Resnik P.  2009.  Topological ordering of function words in hierarchical phrase-based translation. Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP: Volume 1-Volume 1. :324-332.
Berkman O, JaJa JF, Krishnamurthy S, Thurimella R, Vishkin U.  1994.  Top-Bottom Routing around a Rectangle is as Easy as Computing Prefix Minima. SIAM Journal on Computing. 23(3):449-465.
Kolker R, Shneiderman B.  1996.  Tools for creating and exploiting content. Getty Art History Information Program (1996) Research Agenda for Networked Cultural Heritage, Santa Monica. CA: Getty AHIP. :27-30.
Keceli F, Tzannes A, Caragea GC, Barua R, Vishkin U.  2011.  Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1282-1291.
Khuller S, Malekian A, Mestre J.  2007.  To fill or not to fill: the gas station problem. Algorithms–ESA 2007. :534-545.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
Karlson AK, Bederson BB.  2007.  Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
Katz J, Yung M.  2002.  Threshold cryptosystems based on factoring. Advances in Cryptology—ASIACRYPT 2002. :139-147.
Kundu K, Sessions C, desJardins M, Rheingans P.  2002.  Three-dimensional visualization of hierarchical task network plans. In Proceedings of the 3rd International NASA Workshop on Planning and Scheduling for.
Madabhushi R, Korman CE, Mayergoyz ID.  1996.  A three-dimensional MOSFET solver implementing the fixed point iteration technique. Solid-State Electronics. 39(1):147-157.
Kerr DC, Goldsman N, Mayergoyz ID.  1998.  Three-Dimensional Hydrodynamic Modeling of MOSFET Devices. VLSI Design. 6(1-4):261-265.

Pages