Publications

Export 353 results:
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Grimson W, Huttenlocher D, Jacobs DW.  1992.  A study of affine matching with bounded sensor error. Computer Vision—ECCV'92. :291-306.
Grinstein G, Plaisant C, Laskowski S, O'Connell T, Scholtz J, Whiting M.  2008.  VAST 2008 Challenge: Introducing mini-challenges. Visual Analytics Science and Technology, 2008. VAST '08. IEEE Symposium on. :195-196.
Grinstein G, Scholtz J, Whiting M, Plaisant C.  2009.  VAST 2009 challenge: An insider threat. Visual Analytics Science and Technology, 2009. VAST 2009. IEEE Symposium on. :243-244.
Grinstein G, Kobsa A, Plaisant C, Shneiderman B, Stasko JT.  2003.  Which comes first, usability or utility? Proceedings of the 14th IEEE Visualization 2003 (VIS'03). :112–-112–.
Grinstein G, Konecni S, Scholtz J, Whiting M, Plaisant C.  2010.  VAST 2010 Challenge: Arms dealings and pandemics. Visual Analytics Science and Technology (VAST), 2010 IEEE Symposium on. :263-264.
Grinstein G, O'Connell T, Laskowski S, Plaisant C, Scholtz J, Whiting M.  2006.  VAST 2006 Contest - A Tale of Alderwood. Visual Analytics Science And Technology, 2006 IEEE Symposium On. :215-216.
Grinstein G, Plaisant C, Laskowski S, O'Connell T, Scholtz J, Whiting M.  2007.  VAST 2007 Contest - Blue Iguanodon. Visual Analytics Science and Technology, 2007. VAST 2007. IEEE Symposium on. :231-232.
Grinter RE, W. Edwards K, Chetty M, Poole ES, Sung J-Y, Yang J, Crabtree A, Tolmie P, Rodden T, Greenhalgh C et al..  2009.  The Ins and Outs of Home Networking: The Case for Useful and Usable Domestic Networking. ACM Trans. Comput.-Hum. Interact.. 16(2):8:1-8:28.
Groce A, Katz J.  2010.  A New Framework for Password-Based Authenticated Key Exchange. ACM CCCS 2010.
Groce A, Katz J.  2010.  A new framework for efficient password-based authenticated key exchange. Proceedings of the 17th ACM conference on Computer and communications security. :516-525.
Groce A, Katz J, Yerukhimovich A.  2011.  Limits of computational differential privacy in the client/server setting. Theory of Cryptography. :417-431.
Gross KC, Urmanov A, Votta LG, McMaster S, Porter A.  2006.  Towards Dependability in Everyday Software Using Software Telemetry. Engineering of Autonomic and Autonomous Systems, IEEE International Workshop on. :9-18.
Gross T, Sussman A.  1987.  Mapping a single-assignment language onto the Warp systolic array. Functional Programming Languages and Computer Architecture. :347-363.
Gross KC, Votta LG, Porter A.  2004.  Detecting and correcting a failure sequence in a computer system before a failure occurs.
Grossman D, Hicks MW, Jim T, Morrisett G.  2005.  Cyclone: A type-safe dialect of C. C/C++ Users Journal. 23(1):112-139.
Grossman D, Manson J, Pugh W.  2006.  What do high-level memory models mean for transactions? Proceedings of the 2006 workshop on Memory system performance and correctness - MSPC '06. :62-62.
Grossman D, Morrisett G, Jim T, Hicks MW, Wang Y, Cheney J.  2001.  Cyclone User's Manual, Version 0.1. 3. Computer Science Technical Reports.
Grossman D, Morrisett G, Jim T, Hicks MW, Wang Y, Cheney J.  2002.  Region-based memory management in cyclone. SIGPLAN Not.. 37(5):282-293.
GROVE AJ, Jacobs DW.  1996.  Space/time trade-offs for associative memory. Pattern Recognition, 1996., Proceedings of the 13th International Conference on. 4:296-302vol.4-296-302vol.4.
Grube NE, Taylor EM, Martin, M.P.  2007.  Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198
Grundstrom EL, Reggia JA.  1996.  Learning Activation Rules Rather Than Connection Weights. International journal of neural systems. 7(2):129-148.
Gruser JR, Raschid L, Zadorozhny V, Zhan T.  2000.  Learning response time for websources using query feedback and application in query optimization. The VLDB Journal—The International Journal on Very Large Data Bases. 9(1):18-37.
Gruser J, Raschid L, Vidal ME, Bright L.  1998.  Wrapper generation for Web accessible data sources. 3rd IFCIS International Conference on Cooperative Information Systems, 1998. Proceedings. :14-23.
Grushin A, Reggia JA.  2008.  Automated design of distributed control rules for the self-assembly of prespecified artificial structures. Robotics and Autonomous Systems. 56(4):334-359.
Grushin A, Reggia JA.  2006.  Stigmergic self-assembly of prespecified artificial structures in a constrained and continuous environment. Integrated Computer-Aided Engineering. 13(4):289-312.

Pages