Publications

Export 1377 results:
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
Conference Papers
Feamster N, Nayak A, Kim H, Clark R, Mundada Y, Ramachandran A, bin Tariq M.  2010.  Decoupling policy from configuration in campus and enterprise networks. Local and Metropolitan Area Networks (LANMAN), 2010 17th IEEE Workshop on. :1-6.
Riecken D, Maes P, Shneiderman B, Smith D C.  1995.  Dealing with complexity: uniting agents and direct manipulation (panel session). Conference companion on Human factors in computing systems. :191-192.
Mihaila G, Naumann F, Raschid L, Vidal ME.  2005.  A data model and query language to explore enhanced links and paths in life science sources. Proceedings of the ACM SIGMOD Workshop on The Web and Databases (WebDB).
Roussopoulos N, Kotidis Y.  1998.  The Cubetree Storage Organization. VLDB. :700-700.
Stonedahl F, Rand W, Wilensky U.  2008.  CrossNet: a framework for crossover with network-based chromosomal representations. Proceedings of the 10th annual conference on Genetic and evolutionary computation. :1057-1064.
Fischer G, Jennings P, Maher M L, Resnick M, Shneiderman B.  2009.  Creativity challenges and opportunities in social computing. Proceedings of the 27th international conference extended abstracts on Human factors in computing systems. :3283-3286.
Kim J-S, Nam B, Marsh M, Keleher P, Bhattacharjee B, Richardson D, Wellnitz D, Sussman A.  2007.  Creating a Robust Desktop Grid using Peer-to-Peer Services. Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International. :1-7.
Gopalakrishnan V, Bhattacharjee B, Ramakrishnan KK, Jana R, Srivastava D.  2009.  CPM: Adaptive Video-on-Demand with Cooperative Peer Assists and Multicast. INFOCOM 2009, IEEE. :91-99.
Reggia JA, Sutton III GG, Lynne C, D'Autrechy SC, Armentrout SL.  2000.  Cortical inhibition as explained by the competitive distribution hypothesis. Network models for control and processing. :31-62.
Zajic D, Maxwell M, Doermann D, Rodrigues P, Bloodgood M.  2011.  Correcting Errors in Digital Lexicographic Resources Using a Dictionary Manipulation Language. Electronic lexicography in the 21st century: new applications for new users (eLEX2011). :297-301.
Lapizco-Encinas G, Kingsford C, Reggia JA.  2009.  A cooperative combinatorial Particle Swarm Optimization algorithm for side-chain packing. IEEE Swarm Intelligence Symposium, 2009. SIS '09. :22-29.
Gupta H, Roy Chowdhury AK, Chellappa R.  2004.  Contour-based 3D Face Modeling from a Monocular Video. Proceedings of the British Machine Vision Conference. :39.1-39.10-39.1-39.10.
Seri M, Courtney T, Cukier M, Gupta V, Krishnmamurthy S, Lyons J, Ramasamy H, Ren J, Sanders WH.  2002.  A configurable CORBA gateway for providing adaptable system properties.
Seri M, Courtney T, Cukier M, Gupta V, Krishnmamurthy S, Lyons J, Ramasamy H, Ren J, Sanders WH.  2002.  A configurable CORBA gateway for providing adaptable system properties.
Kuter U, Nau DS, Reisner E, Goldman R.  2007.  Conditionalization: Adapting forward-chaining planners to partially observable environments.
Refaey MA, Elsayed KM, Hanafy SM, Davis LS.  2009.  Concurrent transition and shot detection in football videos using Fuzzy Logic. Image Processing (ICIP), 2009 16th IEEE International Conference on. :4341-4344.
Seydou F, Ramahi O, Duraiswami R, Seppdnen T.  2004.  Computation of Green's function for finite-size photonic crystals by boundary element method. Antennas and Propagation Society International Symposium, 2004. IEEE. 4:4320-4323Vol.4-4320-4323Vol.4.
Deligiannakis A, Kotidis Y, Roussopoulos N.  2004.  Compressing historical information in sensor networks. Proceedings of the 2004 ACM SIGMOD international conference on Management of data - SIGMOD '04. :527-527.
Reddy D, Sankaranarayanan AC, Cevher V, Chellappa R.  2008.  Compressed sensing for multi-view tracking and 3-D voxel reconstruction. Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on. :221-224.
Sutton III GG, Reggia JA, Maisog JM.  1990.  Competitive learning using competitive activation rules. Neural Networks, 1990., 1990 IJCNN International Joint Conference on. :285-291.
Tsoumakos D, Roussopoulos N.  2003.  A comparison of peer-to-peer search methods. Proceedings of the Sixth International Workshop on the Web and Databases.
Rutar N, Almazan CB, Foster JS.  2004.  A comparison of bug finding tools for Java. Software Reliability Engineering, 2004. ISSRE 2004. 15th International Symposium on. :245-256.
Lai V, Rajashekar C, Rand W.  2011.  Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
Lai V, Rajashekar C, Rand W.  2011.  Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
Ottino-Lofler J, Rand W, Wilensky U.  2007.  Coevolution of Predators and Prey in a Spatial Model. Genetic and Evolutionary Computation Conference (GECCO).

Pages