Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Cormode G, Paterson M, Sahinalp S C, Vishkin U.  2000.  Communication complexity of document exchange. Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms. :197-206.
Corrada Bravo H, Ramakrishnan R.  2007.  Optimizing mpf queries. Proceedings of the 2007 ACM SIGMOD international conference on Management of data - SIGMOD '07. :701-701.
Corrada Bravo H, Page D, Ramakrishnan R, Shavlik J, Costa VS.  2005.  A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
Corrada Bravo H, Eng KH, Keles S, Wahba G, Wright S.  2008.  Estimating Tree-Structured Covariance Matrices via Mixed-Integer Programming with an Application to Phylogenetic Analysis of Gene Expression. 1142
Corresponding DGB, Page S, Riolo R, Zellner M, Rand W.  2005.  Path dependence and the validation of agent-based spatial models of land use. International Journal of Geographical Information Science. 19(2):153-174.
Corretjer I, Hsu C, Bhattacharyya SS.  2006.  Configuration and representation of large-scale dataflow graphs using the dataflow interchange format. Proceedings of the IEEE Workshop on Signal Processing Systems, Banff, Canada. :10-15.
Corrochano E B, Ogale AS, Fermüller C, Aloimonos Y.  2005.  Detecting Independent 3D Movement. Handbook of Geometric ComputingHandbook of Geometric Computing. :383-401.
Costello L, Grinstein G, Plaisant C, Scholtz J.  2009.  Advancing User-Centered Evaluation of Visual Analytic Environments Through Contests. Information VisualizationInformation Visualization. 8(3):230-238.
Coutard F|[ccedil]|ois, Crassous P, Droguet M|[euml]|l, Gobin E, Colwell RR, Pommepuy M, Hervio-Heath D.  2007.  Recovery in culture of viable but nonculturable Vibrio parahaemolyticus: regrowth or resuscitation? The ISME Journal. 1(2):111-120.
Cranston CB, Samet H.  2008.  Indexing planar point quartets via geometric attributes. Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems. :71:1–71:4-71:1–71:4.
Cranston CB, Samet H.  2006.  Efficient position-independent iconic search using an R-theta index. Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems. :27-34.
Cranston CB, Samet H.  2007.  Indexing Point Triples Via Triangle Geometry. Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. :936-945.
Crary K, Hicks MW, Weirich S.  2000.  Safe and Flexible Dynamic Linking of Native Code. Technical Reports (CIS).
Craver SA, Wu M, Liu B, Stubblefield A, Swartzlander B, Wallach DS, Dean D, Felten EW.  2001.  Reading between the lines: Lessons from the SDMI challenge. Proceedings of the 10th USENIX Security Symposium. :13-17.
Craver SA, M. Wu, Liu B.  2001.  What can we reasonably expect from watermarks? Applications of Signal Processing to Audio and Acoustics, 2001 IEEE Workshop on the. :223-226.
Cukier M, Panjwani S.  2007.  A Comparison between Internal and External Malicious Traffic. :109-114.
Cukier M, Powell D, Ariat J.  1999.  Coverage estimation methods for stratified fault-injection. Computers, IEEE Transactions on. 48(7):707-723.
Cukier M, Panjwani S.  2009.  Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. Security Privacy, IEEE. 7(1):42-48.
Cukier M, Chandra R, Henke D, Pistole J, Sanders WH.  1999.  Fault injection based on a partial view of the global state of a distributed system. :168-177.
Cukier M, Arlat J, Powell D.  1998.  Frequentist and Bayesian Coverage Estimations for Stratified Fault-Injection. DEPENDABLE COMPUTING AND FAULT TOLERANT SYSTEMS. 11:43-62.
Cukier M, Berthier R, Panjwani S, Tan S.  2006.  A Statistical Analysis of Attack Data to Separate Attacks. :383-392.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Cukier M, Ren J, Rubel P, Bakken DE, Karr DA.  1999.  Building dependable distributed objects with the AQuA architecture. :17-18.
Cukier M, Lyons J, Pandey P, Ramasamy HV, Sanders WH, Pal P, Webber F, Schantz R, Loyall J, Watro R.  2001.  Intrusion tolerance approaches in ITUA. 64
Cukier M, Sharma A.  2007.  Password Changes: Empirical Results. Computers and Software Engineering.

Pages