Export 353 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Grimson W, Huttenlocher D, Jacobs DW.  1992.  A study of affine matching with bounded sensor error. Computer Vision—ECCV'92. :291-306.
Grinstein G, O'Connell T, Laskowski S, Plaisant C, Scholtz J, Whiting M.  2006.  VAST 2006 Contest - A Tale of Alderwood. Visual Analytics Science And Technology, 2006 IEEE Symposium On. :215-216.
Grinstein G, Plaisant C, Laskowski S, O'Connell T, Scholtz J, Whiting M.  2007.  VAST 2007 Contest - Blue Iguanodon. Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on. :231-232.
Grinstein G, Plaisant C, Laskowski S, O'Connell T, Scholtz J, Whiting M.  2008.  VAST 2008 Challenge: Introducing mini-challenges. Visual Analytics Science and Technology, 2008. VAST '08. IEEE Symposium on. :195-196.
Grinstein G, Scholtz J, Whiting M, Plaisant C.  2009.  VAST 2009 challenge: An insider threat. Visual Analytics Science and Technology, 2009. VAST 2009. IEEE Symposium on. :243-244.
Grinstein G, Kobsa A, Plaisant C, Shneiderman B, Stasko JT.  2003.  Which comes first, usability or utility? Proceedings of the 14th IEEE Visualization 2003 (VIS'03). :112–-112–.
Grinstein G, Konecni S, Scholtz J, Whiting M, Plaisant C.  2010.  VAST 2010 Challenge: Arms dealings and pandemics. Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on. :263-264.
Grinter RE, W. Edwards K, Chetty M, Poole ES, Sung J-Y, Yang J, Crabtree A, Tolmie P, Rodden T, Greenhalgh C et al..  2009.  The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking. ACM Trans. Comput.-Hum. Interact.. 16(2):8:1-8:28.
Groce A, Katz J.  2010.  A new framework for efficient password-based authenticated key exchange. Proceedings of the 17th ACM conference on Computer and communications security. :516-525.
Groce A, Katz J, Yerukhimovich A.  2011.  Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
Groce A, Katz J.  2010.  A New Framework for Password-Based Authenticated Key Exchange. ACM CCCS 2010.
Gross KC, Votta LG, Porter A.  2004.  Detecting and correcting a failure sequence in a computer system before a failure occurs.
Gross KC, Urmanov A, Votta LG, McMaster S, Porter A.  2006.  Towards Dependability in Everyday Software Using Software Telemetry. Engineering of Autonomic and Autonomous Systems, IEEE International Workshop on. :9-18.
Gross T, Sussman A.  1987.  Mapping a single-assignment language onto the Warp systolic array. Functional Programming Languages and Computer Architecture. :347-363.
Grossman D, Morrisett G, Jim T, Hicks MW, Wang Y, Cheney J.  2002.  Region-based memory management in cyclone. SIGPLAN Not.. 37(5):282-293.
Grossman D, Hicks MW, Jim T, Morrisett G.  2005.  Cyclone: A type-safe dialect of C. C/C++ Users Journal. 23(1):112-139.
Grossman D, Manson J, Pugh W.  2006.  What do high-level memory models mean for transactions? Proceedings of the 2006 workshop on Memory system performance and correctness - MSPC '06. :62-62.
Grossman D, Morrisett G, Jim T, Hicks MW, Wang Y, Cheney J.  2001.  Cyclone User's Manual, Version 0.1. 3. Computer Science Technical Reports.
GROVE AJ, Jacobs DW.  1996.  Space/time trade-offs for associative memory. Pattern Recognition, 1996., Proceedings of the 13th International Conference on. 4:296-302vol.4-296-302vol.4.
Grube NE, Taylor EM, Martin, M.P.  2007.  Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198
Grundstrom EL, Reggia JA.  1996.  Learning Activation Rules Rather Than Connection Weights. International journal of neural systems. 7(2):129-148.
Gruser J, Raschid L, Vidal ME, Bright L.  1998.  Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
Gruser JR, Raschid L, Zadorozhny V, Zhan T.  2000.  Learning response time for websources using query feedback and application in query optimization. The VLDB Journal—The International Journal on Very Large Data Bases. 9(1):18-37.
Grushin A, Reggia JA.  2010.  Parsimonious rule generation for a nature-inspired approach to self-assembly. ACM Transactions on Autonomous and Adaptive Systems (TAAS). 5(3):1-24.
Grushin A, Reggia JA.  2005.  Evolving processing speed asymmetries and hemispheric interactions in a neural network model. Neurocomputing. 65:47-53.