Publications

Search
Export 1733 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Conference Papers
McMaster S, Memon AM.  2005.  Call stack coverage for test suite reduction. Software Maintenance, 2005. ICSM'05. Proceedings of the 21st IEEE International Conference on. :539-548.
Ilghami O, Nau DS, Munoz-Avila H, Aha DW.  2002.  CaMeL: Learning method preconditions for HTN planning. :131-14.
Chafekar D, Levin D, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
Feamster N, Balakrishnan H, Rexford J, Shaikh A, van der Merwe J.  2004.  The case for separating routing from routers. Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture. :5-12.
Han B, Hui P, Kumar AVS, Marathe MV, Pei G, Srinivasan A.  2010.  Cellular traffic offloading through opportunistic communications: a case study. Proceedings of the 5th ACM workshop on Challenged networks. :31-38.
Vidal ME, Raschid L, Mestre J.  2004.  Challenges in selecting paths for navigational queries: Trade-off of benefit of path versus cost of plan. Proceedings of the 7th International Workshop on the Web and Databases: colocated with ACM SIGMOD/PODS 2004. :61-66.
Cleary KR, Levine BA, Norton GS, Mundur PV.  1997.  Challenges in sending large radiology images over military communications channels. Proceedings of SPIE. 3035:230-230.
Han B, Ji L, Lee S, Miller RR, Bhattacharjee B.  2009.  Channel Access Throttling for Improving WLAN QoS. Sensor, Mesh and Ad Hoc Communications and Networks, 2009. SECON '09. 6th Annual IEEE Communications Society Conference on. :1-9.
Han B, Ji L, Lee S, Miller RR, Bhattacharjee B.  2009.  Channel Access Throttling for Overlapping BSS Management. Communications, 2009. ICC '09. IEEE International Conference on. :1-6.
Minker J.  1997.  A characterization of the partial stable models for disjunctive deductive databases. Logic programming: proceedings of the 1997 International Symposium. :245-245.
Bin Tariq M, Mansy A, Feamster N, Ammar M.  2009.  Characterizing VLAN-induced sharing in a campus network. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :116-121.
Druin A, Weeks A, Massey S, Bederson BB.  2007.  Children's interests and concerns when using the international children's digital library: a four-country case study. Proceedings of the 7th ACM/IEEE-CS joint conference on Digital libraries. :167-176.
Madnani N, Dorr BJ.  2008.  Combining open-source with research to re-engineer a hands-on introductory NLP course. Proceedings of the Third Workshop on Issues in Teaching Computational Linguistics. :71-79.
M. Wu, Mao Y.  2002.  Communication-friendly encryption of multimedia. Multimedia Signal Processing, 2002 IEEE Workshop on. :292-295.
Memon AM, Porter A, Sussman A.  2010.  Community-based, collaborative testing and analysis. Proceedings of the FSE/SDP workshop on Future of software engineering research. :239-244.
Ko MY, Murthy PK, Bhattacharyya SS.  2004.  Compact procedural implementation in DSP software synthesis through recursive graph decomposition. Software and compilers for embedded systems: 8th international workshop, SCOPES 2004, Amsterdam, The Netherlands, September 2-3, 2004: proceedings. 3199:47-47.
Sutton III GG, Reggia JA, Maisog JM.  1990.  Competitive learning using competitive activation rules. Neural Networks, 1990., 1990 IJCNN International Joint Conference on. :285-291.
Cevher V, Gurbuz AC, McClellan JH, Chellappa R.  2008.  Compressive wireless arrays for bearing estimation. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :2497-2500.
Mount D, Netanyahu NS, Piatko CD, Silverman R, Wu AY.  2004.  A computational framework for incremental motion. Proceedings of the twentieth annual symposium on Computational geometry. :200-209.
Poole EShehan, Chetty M, Morgan T, Grinter RE, W. Edwards K.  2009.  Computer Help at Home: Methods and Motivations for Informal Technical Support. SIGCHI '09. :739-748.
Greif I, Curtis B, Krasner H, Malone TW, Shneiderman B.  1987.  Computer-supported cooperative work (panel): is this REALLY a new field of research? Proceedings of the SIGCHI/GI conference on Human factors in computing systems and graphics interface. :227-228.
Kanungo T, Mount D, Netanyahu NS, Piatko C, Silverman R, Wu AY.  1999.  Computing nearest neighbors for moving points and applications to clustering. Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms. :931-932.
Mohammad S, Dorr BJ, Hirst G.  2008.  Computing word-pair antonymy. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :982-991.
Swaminathan A, Mao Y, Su G-M, Gou H, Varna AL, He S, M. Wu, Oard D.  2007.  Confidentiality-preserving rank-ordered search. Proceedings of the 2007 ACM workshop on Storage security and survivability. :7-12.
Gupta A, Mittal A, Davis LS.  2006.  Constraint Integration for Multiview Pose Estimation of Humans with Self-Occlusions. 3D Data Processing, Visualization, and Transmission, Third International Symposium on. :900-907.

Pages