Publications

Export 1734 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is M  [Clear All Filters]
Book Chapters
Berman P, Hannenhalli S, Karpinski M.  2002.  1.375-Approximation Algorithm for Sorting by Reversals. Algorithms — ESA 2002Algorithms — ESA 2002. 2461:401-408.
Xu Q, desJardins M, Wagstaff K.  2005.  Active Constrained Clustering by Examining Spectral Eigenvectors. Discovery ScienceDiscovery Science. 3735:294-307.
Dachman-Soled D, Malkin T, Raykova M, Venkitasubramaniam M.  2013.  Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments. Advances in Cryptology - ASIACRYPT 2013. :316-336.
Memon AM, Nguyen BN.  2010.  Advances in Automated Model-Based System Testing of Software Applications with a GUI Front-End. Advances in ComputersAdvances in Computers. Volume 80:121-162.
Memon AM.  2003.  Advances in GUI Testing. Advances in ComputersAdvances in Computers. Volume 58:149-201.
Eaton C, Memon AM.  2009.  Advances in Web Testing. Computer Performance IssuesComputer Performance Issues. Volume 75:281-306.
Udrea O, Majkić Z, Subrahmanian V.  2007.  Aggregates in Generalized Temporally Indeterminate Databases. Scalable Uncertainty ManagementScalable Uncertainty Management. 4772:171-186.
Memon AM, Xie Q.  2007.  Agile Quality Assurance Techniques for GUI-Based Applications. Agile software development quality assuranceAgile software development quality assurance. :114-114.
Li R, Chellappa R.  2010.  Aligning Spatio-Temporal Signals on a Special Manifold. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6315:547-560.
Maneewongvatana S, Mount D.  2002.  Analysis of approximate nearest neighbor searching with clustered point sets. Data Structures, Near Neighbor Searches, and MethodologyData Structures, Near Neighbor Searches, and Methodology. 59:105-123.
Maneewongvatana S, Mount D.  2002.  Analysis of approximate nearest neighbor searching with clustered point sets. Data Structures, Near Neighbor Searches, and MethodologyData Structures, Near Neighbor Searches, and Methodology. 59:105-123.
Mount D, Netanyahu NS, Zuck E.  2004.  Analyzing the number of samples required for an approximate Monte-Carlo LMS line estimator. Theory and Applications of Recent Robust MethodsTheory and Applications of Recent Robust Methods. :207-219.
Gopalan R, Turaga P, Chellappa R.  2010.  Articulation-Invariant Representation of Non-planar Shapes. Computer Vision – ECCV 2010Computer Vision – ECCV 2010. 6313:286-299.
Keogh E, Hochheiser H, Shneiderman B.  2002.  An Augmented Visual Query Mechanism for Finding Patterns in Time Series Data. Flexible Query Answering SystemsFlexible Query Answering Systems. 2522:240-250.
Memon AM.  2004.  Automated GUI regression testing using AI planning. Artificial Intelligence Methods in Software TestingArtificial Intelligence Methods in Software Testing. :51-99.
Svec P, Gupta SK.  2011.  Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries. New Horizons in Evolutionary Robotics. 341:171-193.
Wu D, Parsia B, Sirin E, Hendler J, Nau DS.  2003.  Automating DAML-S Web Services Composition Using SHOP2. The Semantic Web - ISWC 2003. 2870:195-210.
Ji H, Fermüller C.  2004.  Bias in Shape Estimation. Computer Vision - ECCV 2004Computer Vision - ECCV 2004. 3023:405-416.
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Choi SGeol, Dachman-Soled D, Malkin T, Wee H.  2008.  Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Theory of Cryptography. :427-444.
Dachman-Soled D, Mahmoody M, Malkin T.  2014.  Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? Theory of Cryptography. :217-239.
Dachman-Soled D, Mahmoody M, Malkin T.  2014.  Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? Theory of Cryptography. :217-239.
Nikolova S, Boyd-Graber J, Fellbaum C.  2012.  Collecting Semantic Similarity Ratings to Connect Concepts in Assistive Communication Tools. Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures. 370:81-93.
Hannenhalli S, Hubbell E, Lipshutz R, Pevzner P.  2002.  Combinatorial Algorithms for Design of DNA Arrays. Chip TechnologyChip Technology. 77:1-19.

Pages