Publications
Export 620 results:
Author [ Title![(Desc)](https://www.umiacs.umd.edu/sites/all/modules/biblio/misc/arrow-desc.png)
Filters: First Letter Of Last Name is T [Clear All Filters]
2008. Athos: Efficient Authentication of Outsourced File Systems: Information Security. Lecture Notes in Computer Science. :80-96.
2008. Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
2008. Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
1980. Automatic database system conversion: A transformation language approach to sub-schema implementation. IEEE Computer Software and Applications Conference. :80-88.
1982. Automatic database system conversion: schema revision, data translation, and source-to-source program transformation. Proceedings of the June 7-10, 1982, national computer conference. :579-587.
2007. Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
2011. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
2004. Bidimensional Parameters and Local Treewidth. Latin 2004: Theoretical Informatics: 6th Latin American Symposium, Buenos Aires, Argentina, April 5-8, 2004: Proceedings. :109-109.
2006. Block preconditioners based on approximate commutators. SIAM Journal on Scientific Computing. 27(5):1651-1668.
2011. Blurring-invariant Riemannian metrics for comparing signals and images. 2011 IEEE International Conference on Computer Vision (ICCV). :1770-1775.
2012. A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
2012. A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
2005. Bounds on the efficiency of generic cryptographic constructions. SIAM Journal on Computing. 35(1):217-217.
2011. Broadband internet performance: A view from the gateway. SIGCOMM-Computer Communication Review. 41(4):134-134.
2005. Broadening Access to Large Online Databases by Generalizing Query Previews (2000). Institute for Systems Research Technical Reports.
2003. Broadening Access to Large Online Databases by Generalizing Query Previews. The Craft of Information VisualizationThe Craft of Information Visualization. :31-37.
2010. Broader incorporation of bioinformatics in education: opportunities and challenges. Brief Bioinform. 11(537-543)
2005. Browsing Large Online Data Tables Using Generalized Query Previews (2001). Institute for Systems Research Technical Reports.
2007. Browsing large online data tables using generalized query previews. Information Systems. 32(3):402-423.
2001. Building an Experience Base for Software Engineering: A report on the first CeBASE eWorkshop. Product Focused Software Process Improvement. :110-125.