Publications

Export 124 results:
[ Author(Desc)] Title Type Year
Filters: Keyword is Computer science  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Andrade H, Kurc T, Sussman A, Saltz J.  2002.  Scheduling multiple data visualization query workloads on a shared memory machine. Parallel and Distributed Processing Symposium., Proceedings International, IPDPS 2002, Abstracts and CD-ROM. :11-18.
Au T-C, Kuter U, Nau DS.  2009.  Planning for Interactions among Autonomous Agents. Programming Multi-Agent Systems. 5442:1-23.
Au T-C, Kuter U, Nau DS.  2005.  Web Service Composition with Volatile Information. The Semantic Web – ISWC 2005. 3729:52-66.
Au T-C, Muñoz-Avila H, Nau DS.  2002.  On the Complexity of Plan Adaptation by Derivational Analogy in a Universal Classical Planning Framework. Advances in Case-Based Reasoning. 2416:199-206.
B
Banerjee S, Lee S, Bhattacharjee B, Srinivasan A.  2006.  Resilient multicast using overlays. IEEE/ACM Transactions on Networking. 14(2):237-248.
Banerjee A, Gupta SK.  2006.  A Step Towards Automated Design of Side Actions in Injection Molding of Complex Parts. Geometric Modeling and Processing - GMP 2006. 4077:500-513.
Bethencourt J, Elaine Shi, Song D.  2010.  Signatures of Reputation. Financial Cryptography and Data Security. 6052:400-407.
Bhat G, Cleaveland R, Grumberg O.  1995.  Efficient on-the-fly model checking for CTL. , Tenth Annual IEEE Symposium on Logic in Computer Science, 1995. LICS '95. Proceedings. :388-397.
Bhat G, Cleaveland R.  1996.  Efficient model checking via the equational μ-calculus. , Eleventh Annual IEEE Symposium on Logic in Computer Science, 1996. LICS '96. Proceedings. :304-312.
Bonsignore EM, Dunne C, Rotman D, Smith M, Capone T, Hansen DL, Shneiderman B.  2009.  First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. International Conference on Computational Science and Engineering, 2009. CSE '09. 4:332-339.
Borah M, Bajwa RS, Hannenhalli S, Irwin MJ.  1994.  A SIMD solution to the sequence comparison problem on the MGAP. International Conference on Application Specific Array Processors, 1994. Proceedings. :336-345.
Braccini C, De Floriani L, Vernazza G.  1995.  Image Analysis and Processing: 8th International Conference, Iciap '95, San Remo, Italy, September 13-15, 1995 : Proceedings.
Brough J, Schwartz M, Gupta SK, Anand D, Kavetsky R, Pettersen R.  2007.  Towards the development of a virtual environment-based training system for mechanical assembly operations. Virtual Reality. 11(4):189-206.
Browne HK, Arbaugh WA, McHugh J, Fithen WL.  2001.  A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
C
Ceaparu I, Shneiderman B.  2002.  Improving Web-based civic information access: a case study of the 50 US states. 2002 International Symposium on Technology and Society, 2002. (ISTAS'02). :275-282.
Chafekar D, Levin D, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
Chandrasekharan N, Hannenhalli S.  1992.  Efficient algorithms for computing matching and chromatic polynomials on series-parallel graphs. , Fourth International Conference on Computing and Information, 1992. Proceedings. ICCI '92. :42-45.
Chang C, Kurc T, Sussman A, Saltz J.  2000.  Optimizing retrieval and processing of multi-dimensional scientific datasets. Parallel and Distributed Processing Symposium, 2000. IPDPS 2000. Proceedings. 14th International. :405-410.
Chintalapani G, Plaisant C, Shneiderman B.  2004.  Extending the utility of treemaps with flexible hierarchy. Eighth International Conference on Information Visualisation, 2004. IV 2004. Proceedings. :335-344.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Chung I-H, Hollingsworth J.  2004.  Automated cluster-based Web service performance tuning. 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. :36-44.
Cleaveland R, Steffen B.  1990.  When is `partial' adequate? A logic-based proof technique using partial specifications Logic in Computer Science, 1990. LICS '90, Proceedings., Fifth Annual IEEE Symposium on e. :440-449.
Cleaveland R, Zwarico AE.  1991.  A theory of testing for real-time. , Proceedings of Sixth Annual IEEE Symposium on Logic in Computer Science, 1991. LICS '91. :110-119.
D
Dang G, North C, Shneiderman B.  2001.  Dynamic queries and brushing on choropleth maps. Fifth International Conference on Information Visualisation, 2001. Proceedings. :757-764.

Pages