Publications

Export 1377 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
Reports
Lopez A, Nossal M, Hwa R, Resnik P.  2002.  Word-level Alignment for Multilingual Resource Acquisition.
Kang H, Roussopoulos N.  1987.  Using 2-way Semijoins in Distributed Query Processing.. ISR-TR-1987-35
Chipman G, Plaisant C, Gahagan S, Herrmann JW, Hewitt S, Reaves L.  2001.  Understanding Manufacturing Systems with a Learning Historian for User-Directed Experimentation. CS-TR-4243
Roginsky J, Stewart G.W.  1998.  Time-Domain Extraction of Broad-Band Sources by Tikhonov-Phillips Regularization of Triangular Toeplitz Kernels*. UMIACS-TR-95-87
Frangiadakis N, Kuklov D, Roussopoulos N.  2007.  System for 802.11 connectivity at high speed. UMIACS-TR-2007-27
Kia O, Doermann D, Rosenfeld A, Chellappa R.  1997.  Symbolic Compression and Processing of Document Images. LAMP-TR-004,CFAR-TR-849,CS-TR-3734
Harper M, Dorr BJ, Hale J, Roark B, Shafran I, Lease M, Liu Y, Snover M, Yung L, Krasnyanskaya A et al..  2005.  Structural metadata and parsing speech.
Cabezas C, Dorr BJ, Resnik P.  2001.  Spanish Language Processing at University of Maryland: Building Infrastructure for Multilingual Applications.
Brooks FP, Airey J, Alspaugh J, Bell A, Brown R, Hill C, Nimscheck U, Rheingans P, Rohlf J, Smith D et al..  1992.  Six Generations of Building Walkthrough: Final Technical Report to the National Science Foundation.
Brooks FP, Airey J, Alspaugh J, Bell A, Brown R, Hill C, Nimscheck U, Rheingans P, Rohlf J, Smith D et al..  1992.  Six Generations of Building Walkthrough: Final Technical Report to the National Science Foundation.
Reggia JA, Schultz R, Uriagereka J, Wilkinson J.  2000.  A SIMULATION ENVIRONMENT FOR EVOLVING MULTIAGENT COMMUNICATION. UMIACS-TR-2000-64
Reggia JA, Chou H-H, Armentrout SL, Peng Y.  1992.  Simple systems exhibiting self-directed replication: annex of transition functions and software documentation.
Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.
Bangera R, Rand W.  2000.  Reverse Engineering and UML: A Case Study of AuctionBot. EECS 581
Dori D, Doermann D, Shin C, Haralick R, Phillips I, Buchman M, Ross D.  1995.  The representation of document structure: A generic object-process approach. CAR-TR-785
Doermann D, Rosenfeld A.  1991.  Recovery of Temporal Information from Static Images of Handwriting. CAR-TR-595
Elaine Shi, Lu Y, Reid M.  2005.  Recovering from Intrusions in the OSPF Data-plane. Selected Project Reports, Spring 2005 Advanced OS & Distributed Systems (15-712).
Clark R, Feamster N, Nayak A, Reimers A.  2009.  Pushing Enterprise Security Down the Network Stack. GT-CS-09-03
Mundada Y, Ramachandran A, Tariq MB, Feamster N.  2011.  Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks. GT-CS-11-01
Ramachandran A, Bhandankar K, Tariq MB, Feamster N.  2008.  Packets with provenance. GT-CS-08-02
Chang SC, JaJa JF, Ryu KW.  1989.  Optimal parallel algorithms for one-layer routing.
Atallah GC, Ball MO, Baras JS, Goli SK, Karne RK, Kelley S, Kumar HP, Plaisant C, Roussopoulos N, Shneiderman B et al..  1994.  Next Generation Network Management Technology. Institute for Systems Research Technical Reports.
Hilke J, Lohn J, Reggia JA, Navarro R.  1994.  A modified cellular automata model of nucleotide interactions and DNA replication.

Pages