Publications

Search
Export 1388 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
Conference Papers
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A.  2011.  Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A.  2011.  Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Varshavsky A, Chen MY, de Lara E, Froehlich J, Haehnel D, Hightower J, LaMarca A, Potter F, Sohn T, Tang K et al..  2005.  Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
Kraus S, Perlis D.  1989.  Assessing others' knowledge and ignorance. Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems.
Zotkin DN, Keleher PJ, Perkovic D.  2000.  Attacking the bottlenecks of backfilling schedulers. Cluster Computing.
Papamanthou C, Tamassia R, Triandopoulos N.  2008.  Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Gu R, Piat J, Raulet M, Janneck JW, Bhattacharyya SS.  2010.  Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP). :265-272.
Patel VM, Nasrabadi NM, Chellappa R.  2010.  Automatic target recognition based on simultaneous sparse representation. Image Processing (ICIP), 2010 17th IEEE International Conference on. :1377-1380.
Oard D, Demner-Fushman D, Hajic J, Ramabhadran B, Gustman S, Byrne WJ, Soergel D, Dorr BJ, Resnik P, Picheny M.  2002.  Automatic transcription of Czech language oral history in the MALACH project: resources and initial experiments. Proceedings of the The 5th International Conference on Text, Speech and Dialogue. :57-64.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
Zagoria R, Reggia JA, Price T, Banko M.  1981.  Bayesian classification in medicine: The transferability question. Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care. :250-252.
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Bertini E, Perer A, Plaisant C, Santucci G.  2008.  BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
Goldberg L A, Paterson M, Srinivasan A, Sweedyk E.  1997.  Better approximation guarantees for job-shop scheduling. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :599-608.
Elaine Shi, Perrig A, Van Doorn L.  2005.  BIND: a fine-grained attestation service for secure distributed systems. :154-168.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Plaisant C, Marchionini G, Bruns T, Komlodi A, Campbell L.  1997.  Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program. Proceedings of the SIGCHI conference on Human factors in computing systems. :518-525.
Plaisant C, Marchionini G, Komlodi A.  1998.  Bringing treasures to the surface: previews and overviews in a prototype for the Library of Congress National Digital Library. CHI 98 conference summary on Human factors in computing systems. :187-188.
Chafekar D, Levin D, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.

Pages