Publications

Export 538 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is A  [Clear All Filters]
2007
Rosenfeld SN, Rus I, Cukier M.  2007.  Archetypal behavior in computer security. Journal of Systems and Software. 80(10):1594-1606.
Grube NE, Taylor EM, Martin, M.P.  2007.  Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198
Rawlings TK, Ruiz GM, Colwell RR.  2007.  Association of Vibrio Cholerae O1 El Tor and O139 Bengal with the Copepods Acartia Tonsa and Eurytemora Affinis. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 73(24):7926-7933.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Brooks PA, Memon AM.  2007.  Automated gui testing guided by usage profiles. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :333-342.
Zhu G, Doermann D.  2007.  Automatic Document Logo Detection. The 9th International Conference on Document Analysis and Recognition (ICDAR 2007). :864-868.
Tabatabaee V, Hollingsworth J.  2007.  Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
Brabec F, Samet H.  2007.  Autonomic computing. IEEE internet computing. 11(1):52-59.
2006
Au TC, Nau DS.  2006.  Accident or intention: That is the question (in the noisy iterated prisoner’s dilemma). :561-568.
Aggarwal G, Feder T, Kenthapadi K, Khuller S, Panigrahy R, Thomas D, Zhu A.  2006.  Achieving anonymity via clustering. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :153-162.
Sundaresan A, Chellappa R.  2006.  Acquisition of Articulated Human Body Models Using Multiple Cameras. Articulated Motion and Deformable ObjectsArticulated Motion and Deformable Objects. 4069:78-89.
Tsoumakos D, Roussopoulos N.  2006.  An adaptive probabilistic replication method for unstructured p2p networks. On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE. :480-497.
Bright L, Gal A, Raschid L.  2006.  Adaptive pull-based policies for wide area data delivery. ACM Transactions on Database Systems (TODS). 31(2):631-671.
Broadwater J, Chellappa R.  2006.  An Adaptive Threshold Method for Hyperspectral Target Detection. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
Karagol-Ayan B, Doermann D, Weinberg A.  2006.  Adaptive Transformation-based Learning for Improving Dictionary Tagging. Proceedings of the 11th Conference on European Chapter of the Association for Computational Linguistics. :257-264.
Boyd-Graber J, Fellbaum C, Osherson D, Schapire R.  2006.  Adding dense, weighted connections to wordnet. Proceedings of the Third International WordNet Conference. :29-36.
Zelkowitz MV, Tseng C-W.  2006.  Advances in Computers: Computational Biology and Bioinformatics.
Kashyap S, Khuller S.  2006.  Algorithms for non-uniform size data placement on parallel disks. Journal of Algorithms. 60(2):144-167.
Peng T, Balijepalli A, Gupta SK, LeBrun TW.  2006.  Algorithms for on-line monitoring of components in an optical tweezers-based assembly cell. :1-13.
Kalsi A, O'Leary DP.  2006.  Algorithms for Structured Total Least Squares Problems with Applications to Blind Image Deblurring. Journal of Research of the National Institute of Standards and Technology. 111(2):113-119.
Seligman M, Fall K, Mundur P.  2006.  Alternative custodians for congestion control in delay tolerant networks. Proceedings of the 2006 SIGCOMM workshop on Challenged networks. :229-236.
Wu CT, Elman H.  2006.  Analysis and comparison of geometric and algebraic multigrid for convection-diffusion equations. ANALYSIS. 28(6):2208-2228.
Wu M, Martin, M.P.  2006.  Analysis of Shock Motion in a Compression Ramp Configuration using DNS data. Bulletin of the American Physical Society.
Katz J, Smith A.  2006.  Analyzing the HB and HB+ protocols in the “large error” case. IACR ePrint report. 326:2006-2006.
Li Y, Zheng Y, Doermann D, Jaeger S.  2006.  ANew Algorithm for Detecting Text Line in Handwritten Documents. 10th International Workshop on Frontiers in Handwriting Recognition. :35-40.

Pages