Publications

Export 927 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Nau DS, Wilkenfeld J.  2008.  Computational Cultural Dynamics. Intelligent Systems, IEEE. 23(4):18-19.
Weissman A, Petrov M, Gupta SK.  2011.  A computational framework for authoring and searching product design specifications. Advanced Engineering Informatics. 25(3):516-534.
Mount D, Netanyahu NS, Piatko CD, Silverman R, Wu AY.  2004.  A computational framework for incremental motion. Proceedings of the twentieth annual symposium on Computational geometry. :200-209.
Goodall S, Reggia JA, Chen Y, Ruppin E, Whitney C.  1997.  A computational model of acute focal cortical lesions. Stroke. 28(1):101-101.
Sen M, Corretjer I, Haim F, Saha S, Bhattacharyya SS, Schlessman J, Wolf W.  2005.  Computer vision on FPGAs: Design methodology and its application to gesture recognition. Computer Vision and Pattern Recognition-Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on. :133-133.
Kanungo T, Mount D, Netanyahu NS, Piatko C, Silverman R, Wu AY.  1999.  Computing nearest neighbors for moving points and applications to clustering. Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms. :931-932.
Varshney A, Brooks, F.P. J., Wright WV.  1994.  Computing smooth molecular surfaces. Computer Graphics and Applications, IEEE. 14(5):19-25.
Jacobs DW, Weinshall D, Gdalyahu Y.  1998.  Condensing image databases when retrieval is based on non-metric distances. Computer Vision, 1998. Sixth International Conference on. :596-601.
Reggia JA, Schulz R, Wilkinson GS, Uriagereka J.  2001.  Conditions enabling the emergence of inter-agent signalling in an artificial world. Artificial Life. 7(1):3-32.
desJardins M, MacGlashan J, Wagstaff KL.  2010.  Confidence-based feature acquisition to minimize training and test costs. Proceedings of the SIAM Conference on Data Mining. 76(373):514-524.
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, M. Wu, Oard D.  2007.  Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
Whitfield KC, Goodall SM, Reggia JA.  1989.  A connectionist model for dynamic control. Telematics and Informatics. 6(3-4):375-390.
Pugh W, Wonnacott D.  1998.  Constraint-based array dependence analysis. ACM Transactions on Programming Languages and SystemsACM Trans. Program. Lang. Syst.. 20(3):635-678.
Winternitz LB, Nicholls SO, Tits Aé, O'Leary DP.  2011.  A Constraint-Reduced Variant of Mehrotra's Predictor-Corrector Algorithm. Computational Optimization and Applications.
Wei Z, JaJa JF.  2011.  Constructing Inverted Files on a Cluster of Multicore Processors Near Peak I/O Throughput. UMIACS-TR-2011-03
Wei Z, JaJa JF.  2012.  Constructing Inverted Files: To MapReduce or Not Revisited. UMIACS-TR-2012-03
Wang L, Oard D.  2009.  Context-based message expansion for disentanglement of interleaved text conversations. Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics. :200-208.
Bederson BB, Wallace RS, Schwartz EL.  1993.  Control and design of the spherical pointing motor. , 1993 IEEE International Conference on Robotics and Automation, 1993. Proceedings. :630-636vol.2-630-636vol.2.
He T, Hong L, Varshney A, Wang SW.  1996.  Controlled topology simplification. Visualization and Computer Graphics, IEEE Transactions on. 2(2):171-184.
Wolverton M, desJardins M.  1998.  Controlling communication in distributed planning using irrelevance reasoning. Proceedings of the fifteenth national/tenth conference on Artificial intelligence/Innovative applications of artificial intelligence. :868-874.
Mao Y, M. Wu.  2005.  Coordinated sensor deployment for improving secure communications and sensing coverage. Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. :117-128.
desJardins M, Wolverton M.  1999.  Coordinating a Distributed Planning System. AI Magazine. 20(4):45-45.
Lee W, Dagon D, Giffin J, Feamster N, Ollman G, Westby J, Wesson R, Vixie P.  2011.  Countering Botnets: Anomaly-Based Detection, Comprehensive Analysis, and Efficient Mitigation.
Lee W, Dagon D, Giffin J, Feamster N, Ollman G, Westby J, Wesson R, Vixie P.  2011.  Countering Botnets: Anomaly-Based Detection, Comprehensive Analysis, and Efficient Mitigation.
Zo Y-G, Chokesajjawatee N, Arakawa E, Watanabe H, Huq A, Colwell RR.  2008.  Covariability of Vibrio Cholerae Microdiversity and Environmental Parameters. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 74(9):2915-2920.

Pages