Publications

Export 292 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Snover M, Madnani N, Dorr BJ, Schwartz R.  2009.  Fluency, adequacy, or HTER?: exploring different human judgments with a tunable MT metric Proceedings of the Fourth Workshop on Statistical Machine Translation. :259-268.
Gumerov NA, Duraiswami R.  2006.  FMM accelerated BEM for 3D Laplace & Helmholtz equations. Proceedings Int. Conf. on Boundary Element Techniques.
Card SK, Mackinlay JD, Shneiderman B.  1999.  Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
Ma H, Doermann D.  2005.  Font identification using the grating cell texture operator. SPIE Conference on Document Recogntion and Retreival XXII. :148-156.
Paluska, Saff, Yeh, Chen.  2003.  Footloose: a case for physical eventual consistency and selective conflict resolution. Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on. :170-179.
Zhao HV, M. Wu, Wang ZJ, Liu KJR.  2005.  Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Image Processing, IEEE Transactions on. 14(5):646-661.
Lu W, Varna AL, Wu M.  2010.  Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.
Tse C, Krafft C, Mayergoyz ID, McAvoy P, Tseng C-Y.  2005.  Forensic recovery of hard disk data by using the spin-stand imaging technique. Proceedings of SPIE. 5778(1):595-606.
Grant J, Kraus S, Perlis D.  2005.  Formal approaches to teamwork. We Will Show Them: Essays in Honour of Dov Gabbay. 1:39-68.
Reggia JA, Nau DS, Wang P, Peng Y.  1985.  A formal model of abductive inference. Information Sciences. 37:227-285.
Reggia JA, Nau DS, Wang PY, Peng Y.  1985.  A formal model of diagnostic inference, II. Algorithmic solution and application. Information Sciences. 37(1-3):257-285.
Ray A, Cleaveland R.  2004.  Formal Modeling Of Middleware-based Distributed Systems. Electronic Notes in Theoretical Computer Science. 108:21-37.
Tian J, Zelkowitz MV.  1992.  A formal program complexity model and its application. Journal of Systems and Software. 17(3):253-266.
Weissman A, Gupta SK, Fiorentini X, Sudarsan R, Sriram R.  2009.  Formal Representation of Product Design Specifications for Validating Product Design. :1411-1422.
Ramasamy HV, Cukier M, Sanders WH.  2002.  Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
Ramasamy HV, Cukier M, Sanders WH.  2003.  Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
Bierman G, Hicks MW, Sewell P, Stoyle G.  2003.  Formalizing dynamic software updating. Proceedings of the Second International Workshop on Unanticipated Software Evolution (USE).
Pratikakis P, Foster JS, Hicks MW, Neamtiu I.  2008.  Formalizing Soundness of Contextual Effects. Theorem Proving in Higher Order LogicsTheorem Proving in Higher Order Logics. 5170:262-277.
Liao HS, Osada M, Shneiderman B.  1992.  A formative evaluation of three interfaces for browsing directories using dynamic queries.
Minker J.  2007.  Forming a Computer Science Center at the University of Maryland. IEEE Annals of the History of Computing. 29(1):49-64.
Stewart G.W.  2003.  A Fortran 95 Matrix Wrapper. UMIACS-TR-2003-89
Kreitzberg CB, Shneiderman B.  1990.  FORTRAN Programming: A Spiral Approach.
Katz J, Ostrovsky R, Yung M.  2003.  Forward secrecy in password-only key exchange protocols. Proceedings of the 3rd international conference on Security in communication networks. :29-44.
Kuter U, Nau DS.  2004.  Forward-chaining planning in nondeterministic domains. :513-518.
Katz J.  2002.  A forward-secure public-key encryption scheme.

Pages