Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
U
Cardone A, Gupta SK, Mount D.  2005.  Using Iterative Strategies for Aligning Attributed Points in Space. ISR-TR-2005-2
Hochheiser H, Shneiderman B.  1999.  Using Interactive Visualizations of WWW Log Data to Characterize Access Patterns and Inform Site Design. Institute for Systems Research Technical Reports.
Hochheiser H, Shneiderman B.  2001.  Using interactive visualizations of WWW log data to characterize access patterns and inform site design. Journal of the American Society for Information Science and Technology. 52(4):331-343.
Resnik P.  1995.  Using information content to evaluate semantic similarity in a taxonomy. Arxiv preprint cmp-lg/9511007.
Molina J, Arbaugh WA.  2002.  Using independent auditors as intrusion detection systems. Information and Communications Security. :291-302.
Tahmoush D, Samet H.  2006.  Using image similarity and asymmetry to detect breast cancer. Proc. of SPIE Vol. 6144:61441S–1-61441S–1.
Song Z, Roussopoulos N.  2000.  Using Hilbert curve in image storing and retrieving. Proceedings of the 2000 ACM workshops on Multimedia - MULTIMEDIA '00. :167-170.
Song Z, Roussopoulos N.  2002.  Using Hilbert curve in image storing and retrieving. Information Systems. 27(8):523-536.
Buck BR, Hollingsworth J.  2000.  Using hardware performance monitors to isolate memory bottlenecks. Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM). :40-40.
Tikir MM, Hollingsworth J.  2004.  Using Hardware Counters to Automatically Improve Memory Performance. Proceedings of the 2004 ACM/IEEE conference on Supercomputing. :46–-46–.
Yuan X, Memon AM.  2007.  Using GUI Run-Time State as Feedback to Generate Test Cases. Software Engineering, 2007. ICSE 2007. 29th International Conference on. :396-405.
Yuan X, Memon AM.  2009.  Using GUI Run-Time State as Feedback for Test Automation.
Stantchev G, Juba D, Dorland W, Varshney A.  2009.  Using Graphics Processors for High-Performance Computation and Visualization of Plasma Turbulence. Computing in Science Engineering. 11(2):52-59.
Shakarian P, V.S. Subrahmanian, Sapino ML, Hermenegildo M, Schaub T.  2010.  Using Generalized Annotated Programs to Solve Social Network Optimization Problems. ICLP.
Zheleva E, Getoor L, Golbeck J, Kuter U.  2010.  Using friendship ties and family circles for link prediction. Advances in Social Network Mining and Analysis. :97-113.
Hierons RM, Krause P, Lüttgen G, Simons AJH, Vilkomir S, Woodward MR, Zedan H, Bogdanov K, Bowen JP, Cleaveland R et al..  2009.  Using formal specifications to support testing. ACM Computing Surveys. 41:1-76.
Nelson R, Aloimonos Y.  1988.  Using flow field divergence for obstacle avoidance in visual navigation. Science Applications International Corp, Proceedings: Image Understanding Workshop,. 2
desJardins M, Getoor L, Koller D.  2000.  Using Feature Hierarchies in Bayesian Network Learning. Abstraction, Reformulation, and Approximation. 1864:260-270.
Kandogan E, Shneiderman B.  1998.  Using elastic windows for World-Wide Web Browsing. CHI 98 conference summary on Human factors in computing systems. :189-190.
Odom J, Hollingsworth J, DeRose L, Ekanadham K, Sbaraglia S.  2005.  Using Dynamic Tracing Sampling to Measure Long Running Programs. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :59–-59–.
Kuter U, Nau DS.  2005.  Using domain-configurable search control for probabilistic planning. 20:1169-1169.
Winder R, Reggia JA.  2004.  Using distributed partial memories to improve self-organizing collective movements. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 34(4):1697-1707.
Jensen CS, Mark L, Roussopoulos N, Sells T.  1993.  Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
Deshpande A, Hellerstein J.  2002.  On using correlation-based synopses during query optimization. Computer Science Division (EECS), University of California Berkeley.
Hollingsworth J, Miller EL.  1997.  Using content-derived names for configuration management. ACM SIGSOFT Software Engineering Notes. 22(3):104-109.

Pages