Publications

Export 3364 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
2011
Bhattacharyya SS, Shen C-C, Plishker W, Sane N, Wu H-H, Gu R.  2011.  Dataflow-Based Implementation of Layered Sensing Applications.
Song S, Keleher P, Bhattacharjee B, Sussman A.  2011.  Decentralized, accurate, and low-cost network bandwidth prediction. 2011 Proceedings IEEE INFOCOM. :6-10.
Song S, Keleher P, Bhattacharjee B, Sussman A.  2011.  Decentralized, accurate, and low-cost network bandwidth prediction. 2011 Proceedings IEEE INFOCOM. :6-10.
Cho I, Shen C-C, Potbhare S, Bhattacharyya SS, Goldsman N.  2011.  Design methods for Wireless Sensor Network Building Energy Monitoring Systems. 2011 IEEE 36th Conference on Local Computer Networks (LCN). :974-981.
Shen C-C, Wu H-H, Sane N, Plishker W, Bhattacharyya SS.  2011.  A design tool for efficient mapping of multimedia applications onto heterogeneous platforms. 2011 IEEE International Conference on Multimedia and Expo (ICME). :1-6.
Shen C-C, Wu H-H, Sane N, Plishker W, Bhattacharyya SS.  2011.  A design tool for efficient mapping of multimedia applications onto heterogeneous platforms. 2011 IEEE International Conference on Multimedia and Expo (ICME). :1-6.
Bryce RC, Sampath S, Memon AM.  2011.  Developing a Single Model and Test Prioritization Strategies for Event-Driven Software. Software Engineering, IEEE Transactions on. 37(1):48-64.
Sharara H, Rand W, Getoor L.  2011.  Differential adaptive diffusion: Understanding diversity and learning whom to trust in viral marketing. Fifth International AAAI Conference on Weblogs and Social Media.
Sankaranarayanan AC, Chellappa R, Baraniuk RG.  2011.  Distributed Sensing and Processing for Multi-Camera Networks. Distributed Video Sensor NetworksDistributed Video Sensor Networks. :85-101.
Maniatis P, Akhawe D, Fall K, Elaine Shi, McCamant S, Song D.  2011.  Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
Maniatis P, Akhawe D, Fall K, Elaine Shi, McCamant S, Song D.  2011.  Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
Bhattacharyya SS, Plishker W, Shen C-C, Sane N, Zaki G.  2011.  The DSPCAD Integrative Command Line Environment: Introduction to DICE Version 1.1.
Bhattacharyya SS, Plishker W, Shen C-C, Sane N, Zaki G.  2011.  The DSPCAD Integrative Command Line Environment: Introduction to DICE Version 1.1.
Shen C-C, Wang L-H, Cho I, Kim S, Won S, Plishker W, Bhattacharyya SS.  2011.  The DSPCAD Lightweight Dataflow Environment: Introduction to LIDE Version 0.1. Technical Reports from UMIACS.
Mardziel P, Magill S, Hicks MW, Srivatsa M.  2011.  Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
desJardins M, Sahami M, Wagstaff K.  2011.  EAAI-10: The First Symposium on Educational Advances in Artificial Intelligence. AI Magazine. 32(1):91-91.
Sahami M, desJardins M, Dodds Z, Neller T.  2011.  Educational advances in artificial intelligence. Proceedings of the 42nd ACM technical symposium on Computer science education. :81-82.
Hsiao HC, Studer A, Dubey R, Elaine Shi, Perrig A.  2011.  Efficient and secure threshold-based event validation for vanets.
Hsiao HC, Studer A, Dubey R, Elaine Shi, Perrig A.  2011.  Efficient and secure threshold-based event validation for vanets.
Huang Y, Shen C, Evans D, Katz J, Shelat A.  2011.  Efficient Secure Computation with Garbled Circuits. Information Systems Security. :28-48.
Huang Y, Shen C, Evans D, Katz J, Shelat A.  2011.  Efficient Secure Computation with Garbled Circuits. Information Systems Security. :28-48.
Hochheiser H, Shneiderman B.  2011.  Electronic medical records: usability challenges and opportunities. Interactions. 18(6):48-49.
Khaladkar M, Smyda M, Hannenhalli S.  2011.  Epigenomic and RNA structural correlates of polyadenylation. RNA Biology. 8(3):529-537.
Sundaresan A, Chellappa R.  2011.  ON THE ESTIMATION OF 3D HUMAN BODY MODELS AND POSE FROM MULTIPLE CAMERAS. EMERGING TOPICS IN COMPUTER VISION AND ITS APPLICATIONS. :3-25.
Hayden C, Smith E, Hardisty E, Hicks MW, Foster JS.  2011.  Evaluating Dynamic Software Update Safety Using Systematic Testing. IEEE Transactions on Software Engineering. PP(99):1-1.

Pages