Publications

Export 1734 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Conference Papers
Arya S, Mount D.  1995.  Approximate range searching. Proceedings of the eleventh annual symposium on Computational geometry. :172-181.
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
Arya S, Cheng S-W, Mount D.  1998.  Approximation algorithms for multiple-tool miling. Proceedings of the fourteenth annual symposium on Computational geometry. :297-306.
Zhang Y, Manister E, Kraus S, V.S. Subrahmanian.  2005.  Approximation results for probabilistic survivability. Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on. :1-10.
Vasan A, Memon AM.  2004.  ASPIRE: automated systematic protocol implementation robustness evaluation. Software Engineering Conference, 2004. Proceedings. 2004 Australian. :241-250.
Meyer R, Cukier M.  2006.  Assessing the Attack Threat due to IRC Channels. :467-472.
Sinha K, Martin, M.P, Candler GV.  2000.  Assessment of Temperature Fluctuation Models for RANS Simulations of Hypersonic Reacting Flows. 38th AIAA Aerospace Sciences Meeting and Exhibit.
Sinha K, Candler GV, Martin, M.P.  2001.  Assessment of the k-epsilon turbulence model for compressible flows using direct simulation data. 39th AIAA Aerospace Sciences Meeting and Exhibit.
Chang T-H, Tom Yeh, Miller R.  2011.  Associating the visual representation of user interfaces with their internal structures and metadata. Proceedings of the 24th annual ACM symposium on User interface software and technology. :245-256.
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Elaine Shi, Song Z.  2010.  Authentication in the clouds: a framework and its application to mobile users. :1-6.
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Elaine Shi, Song Z.  2010.  Authentication in the clouds: a framework and its application to mobile users. :1-6.
Brooks PA, Memon AM.  2007.  Automated gui testing guided by usage profiles. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :333-342.
Rao Y, Mundur P, Yesha Y.  2004.  Automatic video summarization for wireless and mobile environments. 2004 IEEE International Conference on Communications. 3:1532-1536Vol.3-1532-1536Vol.3.
Broadwater J, Meth R, Chellappa R.  2005.  Average relative radiance transform for subpixel detection. Geoscience and Remote Sensing Symposium, 2005. IGARSS '05. Proceedings. 2005 IEEE International. 5:3565-3568.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
Daumé H, Marcu D.  2006.  Bayesian query-focused summarization. Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics. :305-312.
Daumé H, Marcu D.  2005.  Bayesian summarization at DUC and a suggestion for extrinsic evaluation. Document understanding conference.
Anand P, King J, Boyd-Graber J, Wagner E, Martell C, Oard D, Resnik P.  2011.  Believe Me—We Can Do This! Annotating Persuasive Acts in Blog Text. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Farrell R, Oza O, Zhang N, Morariu VI, Darrell T, Davis LS.  2011.  Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
Feamster N, Mao Z M, Rexford J.  2004.  BorderGuard: detecting cold potatoes from peers. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. :213-218.
Plaisant C, Marchionini G, Bruns T, Komlodi A, Campbell L.  1997.  Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program. Proceedings of the SIGCHI conference on Human factors in computing systems. :518-525.
Plaisant C, Marchionini G, Komlodi A.  1998.  Bringing treasures to the surface: previews and overviews in a prototype for the Library of Congress National Digital Library. CHI 98 conference summary on Human factors in computing systems. :187-188.
Oard D, Soergel D, Doermann D, Huang X, Murray CG, Wang J, Ramabhadran B, Franz M, Gustman S, Mayfield J et al..  2004.  Building an information retrieval test collection for spontaneous conversational speech. Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval. :41-48.
Oard D, Soergel D, Doermann D, Huang X, Murray CG, Wang J, Ramabhadran B, Franz M, Gustman S, Mayfield J et al..  2004.  Building an information retrieval test collection for spontaneous conversational speech. Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval. :41-48.
McMaster S, Memon AM.  2005.  Call stack coverage for test suite reduction. Software Maintenance, 2005. ICSM'05. Proceedings of the 21st IEEE International Conference on. :539-548.

Pages