Publications

Export 292 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is F  [Clear All Filters]
2002
Colwell RR.  2002.  Fulfilling the promise of marine biotechnology. Marine biotechnology in the twenty-first century: problems, promise, and productsMarine biotechnology in the twenty-first century: problems, promise, and products. :39-39.
2001
Dorai GK, Yacoob Y.  2001.  Facilitating semantic web search with embedded grammar tags. IJCAI Workshop on E-Business and Intelligent Web.
Dhaliwal S, Gupta SK, Huang J, Kumar M.  2001.  A feature-based approach to automated design of multi-piece sacrificial molds. Journal of Computing and Information Science in Engineering. 1:225-225.
Kommareddy C, Shankar N, Bhattacharjee B.  2001.  Finding close friends on the Internet. Network Protocols, 2001. Ninth International Conference on. :301-309.
Shachnai H, Srinivasan A.  2001.  Finding large independent sets of hypergraphs in parallel. Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures. :163-168.
Jajodia S, Samarati P, Sapino M L, V.S. Subrahmanian.  2001.  Flexible support for multiple access control policies. ACM Trans. Database Syst.. 26(2):214-260.
Jacobs DW, Rokers B, Rudra A, Liu Z.  2001.  Fragment completion in humans and machines. NIPS. :27-34.
2000
Tanin E, Lotem A, Haddadin I, Shneiderman B, Plaisant C, Slaughter L.  2000.  Facilitating data exploration with query previews: A study of user performance and preference. Behaviour & Information Technology. 19(6):393-403.
Khuller S, Pless R, Sussmann YJ.  2000.  Fault tolerant K-center problems. Theoretical Computer Science. 242(1–2):237-245.
Yao Z, Gupta SK, Nau DS.  2000.  Finding the maximal cutter for 2-D milling operations. :10-13.
Wagner D, Foster JS, Brewer EA, Aiken A.  2000.  A first step towards automated detection of buffer overrun vulnerabilities. The 2000 Network and Distributed Systems Security Conference. San Diego, CA. 14
Getoor L, Koller D, Friedman N.  2000.  From instances to classes in probabilistic relational models. Proc. ICML 2000 Workshop on Attribute-Value and Relational Learning.
1999
Cukier M, Chandra R, Henke D, Pistole J, Sanders WH.  1999.  Fault injection based on a partial view of the global state of a distributed system. :168-177.
Wee SJ, Apostolopoulos JG, Feamster N.  1999.  Field-to-frame transcoding with spatial and temporal downsampling. Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on. 4:271-275vol.4-271-275vol.4.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Fisheye views. Readings in information visualizationReadings in information visualization. :311-311.
Pugh W.  1999.  Fixing the Java memory model. Proceedings of the ACM 1999 conference on Java Grande. :89-98.
Edu CU, Purang K, Purushothaman D, Traum D, Andersen C, Perlis D.  1999.  Fkpurang, darsana, traum, cfa, perlisg@ cs. umd. edu. In Proceedings of the IJCAI’99 Workshop on Practical Reasoning and Rationality.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
Stewart G.W.  1999.  Four algorithms for the efficient computation of truncated pivoted QR approximations to a sparse matrix. Numerische Mathematik. 83(2):313-323.

Pages