Publications

Export 7151 results:
Author Title [ Type(Desc)] Year
Conference Papers
Ayers D, Reggia JA.  2001.  Evolving columnar circuitry for lateral cortical inhibition. Neural Networks, 2001. Proceedings. IJCNN'01. International Joint Conference on. 1:278-283.
Stonedahl F, Rand W, Wilensky U.  2010.  Evolving viral marketing strategies. Proceedings of the 12th annual conference on Genetic and evolutionary computation. :1195-1202.
Fekete J-D, Plaisant C.  1999.  Excentric labeling: dynamic neighborhood labeling for data visualization. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :512-519.
Spencer M, Ferreira R, Beynon M, Kurc T, Catalyurek U, Sussman A, Saltz J.  2002.  Executing Multiple Pipelined Data Analysis Operations in the Grid. SC Conference. :54-54.
Elgammal A, Shet V, Yacoob Y, Davis LS.  2003.  Exemplar-based tracking and recognition of arm gestures. Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the 3rd International Symposium on. 2:656-661Vol.2-656-661Vol.2.
Basili VR, Costa P, Lindvall M, Mendonca M, Seaman C, Tesoriero R, Zelkowitz MV.  2001.  An experience management system for a software engineering research organization. Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard. :29-35.
Hicks MW, Morrisett G, Grossman D, Jim T.  2004.  Experience with safe manual memory-management in cyclone. Proceedings of the 4th international symposium on Memory management. :73-84.
Hicks MW, Moore JT, Wetherall D, Nettles S.  2002.  Experiences with capsule-based active networking. DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :16-24.
Wonnacott WPD.  1994.  Experiences with Constraint-based Array Dependence Analysis. Principles and practice of constraint programming: second international workshop, PPCP'94, Rosario, Orcas Island, WA, USA, May 2-4, 1994: proceedings. :312-312.
Porter A, Votta LG.  1994.  An experiment to assess different defect detection methods for software requirements inspections. Proceedings of the 16th international conference on Software engineering. :103-112.
Reif JH, LaBean TH, Pirrung M, Rana VS, Guo B, Kingsford C, Wickham GS.  2002.  Experimental Construction of Very Large Scale DNA Databases with Associative Search. DNA computing: 7th International Workshop on DNA-Based Computers, DNA 7, Tampa, FL, USA, June 10-13, 2001: revised papers. 7:231-231.
Lefever RM, Cukier M, Sanders WH.  2003.  An experimental evaluation of correlated network partitions in the Coda distributed file system. :273-282.
Gupta H, Agrawala AK, Pruthi T, Shekhar C, Chellappa R.  2002.  An experimental evaluation of linear and kernel-based methods for face recognition. Applications of Computer Vision, 2002. (WACV 2002). Proceedings. Sixth IEEE Workshop on. :13-18.
Panjwani S, Tan S, Jarrin KM, Cukier M.  2005.  An experimental evaluation to determine if port scans are precursors to an attack. :602-611.
Oard D, DeClaris N, Dorr BJ, Faloutsos C, Marchionini G.  1995.  Experimental investigation of high performance cognitive and interactive text filtering. , IEEE International Conference on Systems, Man and Cybernetics, 1995. Intelligent Systems for the 21st Century. 5:4398-4403vol.5-4398-4403vol.5.
Votta LG, Porter A, Perry D.  1995.  Experimental software engineering: A report on the state of the art. INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING. 17:277-277.
Shneiderman B.  1975.  Experimental testing in programming languages, stylistic considerations and design techniques. Proceedings of the May 19-22, 1975, national computer conference and exposition. :653-656.
Delis A, Raschid L, Sellis T.  1992.  Experiments on the concurrent rule execution in database systems. Tools with Artificial Intelligence, 1992. TAI'92, Proceedings., Fourth International Conference on. :405-412.
Vishkin U, Dascal S, Berkovich E, Nuzman J.  1998.  Explicit Multi-Threading (XMT) bridging models for instruction parallelism (extended abstract). Proceedings of the tenth annual ACM symposium on Parallel algorithms and architectures. :140-151.
Morselli R, Bhattacharjee B, Katz J, Marsh M.  2007.  Exploiting approximate transitivity of trust. Broadband Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth International Conference on. :515-524.
Raschid L, Sellis T, Lin CC.  2000.  Exploiting concurrency in a DBMS implementation for production systems. Proceedings of the first international symposium on Databases in parallel and distributed systems. :34-45.
Deshpande A, Guestrin C, Hong W, Madden S.  2005.  Exploiting Correlated Attributes in Acquisitional Query Processing. 21st International Conference on Data Engineering, 2005. ICDE 2005. Proceedings. :143-154.
Andrade H, Kurc T, Sussman A, Saltz J.  2003.  Exploiting Functional Decomposition for Efficient Parallel Processing of Multiple Data Analysis Queries. Parallel and Distributed Processing Symposium, International. :81a-81a.
Lacroix Z, Moths T, Parekh K, Raschid L, Vidal M-E.  2004.  Exploiting multiple paths to express scientific queries. 16th International Conference on Scientific and Statistical Database Management, 2004. Proceedings. :357-360.
Lee WJ, Raschid L, Sayyadi H, Srinivasan P.  2008.  Exploiting ontology structure and patterns of annotation to mine significant associations between pairs of controlled vocabulary terms. Data Integration in the Life Sciences. :44-60.

Pages