Conference Papers

Pages

Don A, Brennan S, Laurel B, Shneiderman B. Anthropomorphism: from Eliza to Terminator 2. In: Proceedings of the SIGCHI conference on Human factors in computing systems. New York, NY, USA: ACM; 1992. 6. p. 67-70p. (CHI '92).
Trappe W, M. Wu, Liu KJ. Anti-collusion codes: multi-user and multimedia perspectives. In: Image Processing. 2002. Proceedings. 2002 International Conference on. Vol 2.; 2002. I. II-p. 149-p. II-152 vol.p. 2-p. II-p. 149-p. II-152 vol.2.
Wang ZJ, M. Wu, Trappe W, Liu KJ. Anti-collusion of group-oriented fingerprinting. In: Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. Vol 2.; 2003. I. II - p. 217-20p. vol.p. 2-p. II - p. 217-20p. vol.2.
Perpich JM, Perry DE, Porter A, Votta LG, Wade MW. Anywhere, Anytime Code Inspections: Using the Web to Remove Inspection Bottlenecks in Large-Scale Software Development. In: Software Engineering, International Conference on. Los Alamitos, CA, USA: IEEE Computer Society; 1997. 1. p. 14.
Li J, Zhou SK, Chellappa R. Appearance modeling under geometric context. In: Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on. Vol 2.; 2005. 1. p. 1252-1259p. Vol. p. 2-1252p. -1259 Vol. 2.
Shao J, Zhou SK, Chellappa R. Appearance-based tracking and recognition using the 3D trilinear tensor. In: Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP '04). IEEE International Conference on. Vol 3.; 2004. i. iii - p. 613-16p. vol.p. 3-p. iii - p. 613-16p. vol.3.
Spring N, Wolski R. Application level scheduling of gene sequence comparison on metacomputers. In: Proceedings of the 12th international conference on Supercomputing.; 1998. 1. p. 141-148p.
Josyula DP, Fults S, Anderson ML, Wilson S, Perlis D. Application of MCL in a dialog agent. In: Third Language and Technology Conference.; 2007.
Bai P, Prabhakaran B, Srinivasan A. Application-layer broker for scalable Internet services with resource reservation. In: Proceedings of the seventh ACM international conference on Multimedia (Part 2). New York, NY, USA: ACM; 1999. 1. p. 103-106p. (MULTIMEDIA '99).
Minter J, Perlis D. Applications or Protected Circumscription. In: 7th International Conference on Automated Deduction, Napa, California, USA, May 14-16, 1984: proceedings. Vol 170.; 1984. 4. p. 414.
Fraser T, Petroni J., Arbaugh WA. Applying flow-sensitive CQUAL to verify MINIX authorization check placement. In: Proceedings of the 2006 workshop on Programming languages and analysis for security. Ottawa, Ontario, Canada: ACM; 2006. 3. p. 3-6p. (PLAS '06).
Plishker W, Zaki GF, Bhattacharyya SS, Clancy C, Kuykendall J. Applying graphics processor acceleration in a software defined radio prototyping environment. In: 2011 22nd IEEE International Symposium on Rapid System Prototyping (RSP).; 2011. 6. p. 67-73p.
Das R, Hwang YS, Uysal M, Saltz J, Sussman A. Applying the CHAOS/PARTI library to irregular problems in computational chemistry and computational aerodynamics. In: Scalable Parallel Libraries Conference, 1993., Proceedings of the.; 1993. 4. p. 45-56p.
Tanin E, Samet H. APPOINT: an Approach for Peer-to-Peer Offloading the INTernet. In: Proceedings of the 2002 annual national conference on Digital government research. Digital Government Society of North America; 2002. 1. p. 1-7p. (dg.o '02).
Cole R, Vishkin U. Approximate and exact parallel scheduling with applications to list, tree and graph problems. In: 27th Annual Symposium on Foundations of Computer Science.; 1986. 4. p. 478-491p.
Chu D, Deshpande A, Hellerstein JM, Hong W. Approximate Data Collection in Sensor Networks using Probabilistic Models. In: Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. IEEE; 2006. 4. p. 48.
Shirdhonkar S, Jacobs DW. Approximate earth mover's distance in linear time. In: Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on.; 2008. 1. p. 1-8p.
Raykar VC, Duraiswami R. Approximate expressions for the mean and the covariance of the maximum likelihood estimator for acoustic source localization. In: Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. Vol 3.; 2005. i. iii/p. 73-p. iii/76 Vol. p. 3-p. iii/p. 73-p. iii/76 Vol. 3.
Hussein ME, Abd-Almageed W. Approximate kernel matrix computation on GPUs forlarge scale learning applications. In: Proceedings of the 23rd international conference on Supercomputing. Yorktown Heights, NY, USA: ACM; 2009. 5. p. 511-512p. (ICS '09).
Arya S, Mount D. Approximate nearest neighbor queries in fixed dimensions. In: Proceedings of the fourth annual ACM-SIAM Symposium on Discrete algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics; 1993. 2. p. 271-280p. (SODA '93).
Goodrich MT, Matias Y, Vishkin U. Approximate parallel prefix computation and its applications. In: Parallel Processing Symposium, 1993., Proceedings of Seventh International.; 1993. 3. p. 318-325p.
Arya S, Mount D. Approximate range searching. In: Proceedings of the eleventh annual symposium on Computational geometry. New York, NY, USA: ACM; 1995. 1. p. 172-181p. (SCG '95).
Cole R, Vishkin U. Approximate scheduling, exact scheduling, and applications to parallel algorithms. In: Proceedings Symposium on Foundations of Computer Science.; 1986. 4. p. 478-491p.
Auer P, Long PM, Srinivasan A. Approximating hyper-rectangles: learning and pseudo-random sets. In: Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. New York, NY, USA: ACM; 1997. 3. p. 314-323p. (STOC '97).
Chafekar D, Kumart VS, Marathe MV, Parthasarathy S, Srinivasan A. Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. In: IEEE INFOCOM 2008. The 27th Conference on Computer Communications. IEEE; 2008. 1. p. 1166-1174p.
Arya S, Cheng S-, Mount D. Approximation algorithms for multiple-tool miling. In: Proceedings of the fourteenth annual symposium on Computational geometry. New York, NY, USA: ACM; 1998. 2. p. 297-306p. (SCG '98).
Srinivasan A. Approximation algorithms for stochastic and risk-averse optimization. In: Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms. Philadelphia, PA, USA: Society for Industrial and Applied Mathematics; 2007. 1. p. 1305-1313p. (SODA '07).
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A. Approximation algorithms for throughput maximization in wireless networks with delay constraints. In: 2011 Proceedings IEEE INFOCOM. IEEE; 2011. 1. p. 1116-1124p.
Zhang Y, Manister E, Kraus S, V.S. Subrahmanian. Approximation results for probabilistic survivability. In: Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on.; 2005. 1. p. 1-10p.
Wu Y, Raschid L. ApproxRank: Estimating Rank for a Subgraph. In: IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. IEEE; 2009. 5. p. 54-65p.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, et al. AQuA: an adaptive architecture that provides dependable distributed objects. In: Seventeenth IEEE Symposium on Reliable Distributed Systems.; 1998. 2. p. 245-253p.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, et al. Arabic Cross-Document Coreference Resolution. In: Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$.; 2009. 3. p. 357-360p.
Balkan AO, Qu G, Vishkin U. Arbitrate-and-move primitives for high throughput on-chip interconnection networks. In: Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on. Vol 2.; 2004. I. II - p. 441-4p. Vol.p. 2-p. II - p. 441-4p. Vol.2.
Tahmoush D, Samet H. Archimedes, an archive of medical images. In: American Medical Informatics Association 2006 Annual Symposium Proceedings Biomedical and Health Informatics: From Foundations to Applications to Policy, Washington, DC, DW Bates, JH Holmes, and G. Kuperman, editors.; 2006.
Ray A, Cleaveland R. Architectural Interaction Diagrams: AIDs for System Modeling. In: Software Engineering, International Conference on. Los Alamitos, CA, USA: IEEE Computer Society; 2003. 3. p. 396.
Kobla V, Doermann D, Lin K-. Archiving, indexing, and retrieval of video in compressed domain. In: SPIEConference on Multimedia Storage and Archiving Systems. Vol 2916.; 1996. 7. p. 78-89p.
Zazworka N, Stapel K, Knauss E, Shull F, Basili VR, Schneider K. Are developers complying with the process: an XP study. In: Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. New York, NY, USA: ACM; 2010. 1. 14:p. 1-14p. :p. 10-14p. :p. 1-14p. :10. (ESEM '10).
Varshavsky A, Chen MY, de Lara E, Froehlich J, Haehnel D, Hightower J, et al. Are GSM phones THE solution for localization?. In: Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on.; 2005. 3. p. 34-42p.
Xingyuan L, Doermann D, Oh W, Gao W. ARobust Method for Unknown Forms Analysis. In: ICDAR.; 1999. 5. p. 531-534p.
Zhu G, Jaeger S, Doermann D. ARobust Stamp Detection Framework on Degraded Documents. In: International Conference on Document Recognition and Retrieval XIII. San Jose, CA; 2006. 1. p. 1-9p.
Dumitras T, Efstathopoulos P. Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis. In: LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. USENIX Association; 2012. 1. p. 11. (LEET'12).
Vasan A, Memon AM. ASPIRE: automated systematic protocol implementation robustness evaluation. In: Software Engineering Conference, 2004. Proceedings. 2004 Australian.; 2004. 2. p. 241-250p.
Kraus S, Perlis D. Assessing others' knowledge and ignorance. In: Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems.; 1989.
Sinha K, Martin, M.P, Candler GV. Assessment of Temperature Fluctuation Models for RANS Simulations of Hypersonic Reacting Flows. In: 38th AIAA Aerospace Sciences Meeting and Exhibit. Reno, NV; 2000.
Sinha K, Candler GV, Martin, M.P. Assessment of the k-epsilon turbulence model for compressible flows using direct simulation data. In: 39th AIAA Aerospace Sciences Meeting and Exhibit. Reno, NV; 2001.
Webber W, Oard D, Scholer F, Hedin B. Assessor error in stratified evaluation. In: Proceedings of the 19th ACM international conference on Information and knowledge management.; 2010. 5. p. 539-548p.
El-Alfy H, Jacobs DW, Davis LS. Assigning cameras to subjects in video surveillance systems. In: Robotics and Automation, 2009. ICRA '09. IEEE International Conference on.; 2009. 8. p. 837-843p.

Pages