Publications
Export 383 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is H [Clear All Filters]
2008. Name translation in statistical machine translation: Learning when to transliterate. Proceedings of ACL-08: HLT. :389-397.
1990. Catastrophe theory and computational vision. Proc. AAAI-90 Workshop on Qualitative Vision. :96-100.
1992. Exploratory active vision: theory. Proceedings of 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1992. :10-15.
2007. eHealth Research from the User’s Perspective. American Journal of Preventive Medicine. 32(5, Supplement):S97-S103-S97-S103.
2011. Improved Identification and Visualization of Emergency Department Patient Visits. Annals of Emergency Medicine. 58(4):S309-S309.
1995. What is Fundamental for Markov Chains: First Passage Times, Fundamental Matrices, and Group Generalized Inverses. Proceedings of the Second International Workshop on Markov ChainsProceedings of the Second International Workshop on Markov Chains. :151-161.
1998. Overcoming Instability In Computing The Fundamental Matrix For A Markov Chain. SIAM Journal on Matrix Analysis and Applications. 19(2):534-540.
2002. Experiences with capsule-based active networking. DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :16-24.
2002. A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
2005. Dynamic updating of information-flow policies. Proceedings of the International Workshop on Foundations of Computer Security (FCS).
2010. Adapting Scrum to Managing a Research Group. Technical Reports of the Computer Science Department.
2004. Experience with safe manual memory-management in cyclone. Proceedings of the 4th international symposium on Memory management. :73-84.
1999. PLANet: an active internetwork. IEEE INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 3:1124-1133vol.3-1124-1133vol.3.
2003. A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
2006. Trusted declassification:: high-level policy for a security-typed language. Proceedings of the 2006 workshop on Programming languages and analysis for security. :65-74.
2000. Active Networking Means Evolution (or Enhanced Extensibility Required). Active NetworksActive Networks. 1942:16-32.
2011. Evolution in Action: Using Active Networking to Evolve Network Support for Mobility. IFIP Lecture Notes in Computer Science (LNCS). 2546(2546):146-161.