Export 1253 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
Book Chapters
Gandhi R, Khuller S, Srinivasan A, Wang N.  2003.  Approximation Algorithms for Channel Allocation Problems in Broadcast Networks. Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques. 2764:821-826.
Dumitras T, Srivastava D, Narasimhan P.  2005.  Architecting and Implementing Versatile Dependability. Architecting Dependable Systems III. :212-231.
Gopalan R, Turaga P, Chellappa R.  2010.  Articulation-Invariant Representation of Non-planar Shapes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6313:286-299.
Svec P, Gupta SK.  2011.  Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries. New Horizons in Evolutionary Robotics. 341:171-193.
Conroy JM, Schlesinger JD, O'Leary DP, Goldstein J.  2006.  Back to Basics: CLASSY 2006. DUC 06 Conference ProceedingsDUC 06 Conference Proceedings.
Srinivasan A.  2008.  Budgeted Allocations in the Full-Information Setting. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 5171:247-253.
Dachman-Soled D, Servedio RA.  2011.  A Canonical Form for Testing Boolean Function Properties. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :460-471.
Namata G, Sen P, Bilgic M, Getoor L.  2009.  Collective classification for text classification. Text Mining: Classification, Clustering, and ApplicationsText Mining: Classification, Clustering, and Applications. :51-69.
Bhattacharya I, Getoor L.  2009.  Collective relational clustering. Constrained Clustering: Advances in Algorithms, Theory, and ApplicationsConstrained Clustering: Advances in Algorithms, Theory, and Applications. :221-244.
Dachman-Soled D, Gennaro R, Krawczyk H, Malkin T.  2012.  Computational Extractors and Pseudorandomness. Theory of Cryptography. :383-403.
Goodrich MT, Papamanthou C, Tamassia R.  2007.  On the Cost of Persistence and Authentication in Skip Lists. Experimental Algorithms. :94-107.
Gupta A, Srinivasan A.  2003.  On the Covering Steiner Problem. FST TCS 2003: Foundations of Software Technology and Theoretical Computer ScienceFST TCS 2003: Foundations of Software Technology and Theoretical Computer Science. 2914:244-251.
Oard D, Demner-Fushman D, Hajič J, Ramabhadran B, Gustman S, Byrne W, Soergel D, Dorr BJ, Resnik P, Picheny M.  2006.  Cross-Language Access to Recorded Speech in the MALACH Project. Text, Speech and DialogueText, Speech and Dialogue. 2448:197-212.
Grant J, Minker J.  2007.  Deductive Databases. Wiley Encyclopedia of Computer Science and EngineeringWiley Encyclopedia of Computer Science and Engineering.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Huq A, Grim C, Colwell RR, Nair BG.  2006.  Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in MicrobiologyCurrent Protocols in Microbiology. :6A.5.1-6A.5.38-6A.5.1-6A.5.38.
Baroff J, Simon R, Gilman F, Shneiderman B.  1987.  Direct manipulation user interfaces for expert systems. Expert systems: the user interfaceExpert systems: the user interface. :99-125.
Gopalakrishnan V, Morselli R, Bhattacharjee B, Keleher P, Srinivasan A.  2007.  Distributed Ranked Search. High Performance Computing – HiPC 2007High Performance Computing – HiPC 2007. 4873:7-20.
O'Leary DP, Stewart G.W, van de Geijn R.  1989.  Domino: A Transportable System for Parallel Processing. Parallel Processing and Medium-Scale Multiprocessors (Proceedings of a 1986 Conference)Parallel Processing and Medium-Scale Multiprocessors (Proceedings of a 1986 Conference). :25-34.
Dumitras T, Roşu D, Dan A, Narasimhan P.  2007.  Ecotopia: An Ecological Framework for Change Management in Distributed Systems. Architecting Dependable Systems IV. :262-286.
Heitzmann A, Palazzi B, Papamanthou C, Tamassia R.  2008.  Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
Olsen M, Dorr BJ, Thomas S.  1998.  Enhancing Automatic Acquisition of Thematic Structure in a Large-Scale Lexicon for Mandarin Chinese. Machine Translation and the Information SoupMachine Translation and the Information Soup. 1529:41-50.
Bhattacharya I, Getoor L.  2006.  Entity Resolution in Graphs. Mining Graph DataMining Graph Data. :311-344.
Roe A, Weller S, Baixeras J, Brown JW, Cummings MP, Davis DR, Horak M, Kawahara AY, Mitter C, Parr CS et al..  2010.  Evolutionary framework for Lepidoptera model systems. Genetics and Molecular Biology of LepidopteraGenetics and Molecular Biology of Lepidoptera. :1-24.
Gopalan R, Schwartz WR, Chellappa R, Srivastava A.  2011.  Face Detection. Visual Analysis of HumansVisual Analysis of Humans. :71-90.