Publications
Export 292 results:
Author [ Title] Type Year Filters: First Letter Of Title is F [Clear All Filters]
2009. Fluency, adequacy, or HTER?: exploring different human judgments with a tunable MT metric Proceedings of the Fourth Workshop on Statistical Machine Translation. :259-268.
2006. FMM accelerated BEM for 3D Laplace & Helmholtz equations. Proceedings Int. Conf. on Boundary Element Techniques.
1999. Focus+ context. Readings in information visualizationReadings in information visualization. :306-309.
2005. Font identification using the grating cell texture operator. SPIE Conference on Document Recogntion and Retreival XXII. :148-156.
2003. Footloose: a case for physical eventual consistency and selective conflict resolution. Mobile Computing Systems and Applications, 2003. Proceedings. Fifth IEEE Workshop on. :170-179.
2005. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. Image Processing, IEEE Transactions on. 14(5):646-661.
2010. Forensic hash for multimedia information. SPIE Media Forensics and Security. :7541–0Y-7541–0Y.
2005. Forensic recovery of hard disk data by using the spin-stand imaging technique. Proceedings of SPIE. 5778(1):595-606.
1985. A formal model of diagnostic inference, II. Algorithmic solution and application. Information Sciences. 37(1-3):257-285.
2004. Formal Modeling Of Middleware-based Distributed Systems. Electronic Notes in Theoretical Computer Science. 108:21-37.
1992. A formal program complexity model and its application. Journal of Systems and Software. 17(3):253-266.
2009. Formal Representation of Product Design Specifications for Validating Product Design. :1411-1422.
2002. Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
2003. Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
2003. Formalizing dynamic software updating. Proceedings of the Second International Workshop on Unanticipated Software Evolution (USE).
2008. Formalizing Soundness of Contextual Effects. Theorem Proving in Higher Order LogicsTheorem Proving in Higher Order Logics. 5170:262-277.
2007. Forming a Computer Science Center at the University of Maryland. IEEE Annals of the History of Computing. 29(1):49-64.
2003. Forward secrecy in password-only key exchange protocols. Proceedings of the 3rd international conference on Security in communication networks. :29-44.