Publications

Export 124 results:
[ Author(Desc)] Title Type Year
Filters: Keyword is Computer science  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
N
Nam B, Sussman A.  2005.  Spatial indexing of distributed multidimensional datasets. IEEE International Symposium on Cluster Computing and the Grid, 2005. CCGrid 2005. 2:743-750Vol.2-743-750Vol.2.
Nam B, Sussman A.  2003.  Improving access to multi-dimensional self-describing scientific datasets. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings. CCGrid 2003. :172-179.
Naor M, Schulman LJ, Srinivasan A.  1995.  Splitters and near-optimal derandomization. , 36th Annual Symposium on Foundations of Computer Science, 1995. Proceedings. :182-191.
Natarajan V, Cleaveland R.  1996.  An algebraic theory of process efficiency. , Eleventh Annual IEEE Symposium on Logic in Computer Science, 1996. LICS '96. Proceedings. :63-72.
Nau DS, Wilkenfeld J.  2008.  Computational Cultural Dynamics. Intelligent Systems, IEEE. 23(4):18-19.
O
Oard D, DeClaris N, Dorr BJ, Faloutsos C, Marchionini G.  1995.  Experimental investigation of high performance cognitive and interactive text filtering. , IEEE International Conference on Systems, Man and Cybernetics, 1995. Intelligent Systems for the 21st Century. 5:4398-4403vol.5-4398-4403vol.5.
Oard D, DeClaris N, Dorr BJ, Faloutsos C.  1994.  On automatic filtering of multilingual texts. , 1994 IEEE International Conference on Systems, Man, and Cybernetics, 1994. 'Humans, Information and Technology'. 2:1645-1650vol.2-1645-1650vol.2.
Ogale AS, Aloimonos Y.  2005.  Robust Contrast Invariant Stereo Correspondence. Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005. ICRA 2005. :819-824.
P
Porter A, Votta LG, Basili VR.  1995.  Comparing detection methods for software requirements inspections: a replicated experiment. IEEE Transactions on Software Engineering. 21(6):563-575.
Powell D, Cukier M, Arlat J.  1996.  On stratified sampling for high coverage estimations. Dependable Computing — EDCC-2. 1150:35-54.
Priyadarshi A, Gupta SK.  2006.  Finding Mold-Piece Regions Using Computer Graphics Hardware. Geometric Modeling and Processing - GMP 2006. 4077:655-662.
Pugh W, Wonnacott D.  1995.  Going beyond integer programming with the Omega test to eliminate false data dependences. IEEE Transactions on Parallel and Distributed Systems. 6(2):204-211.
R
Radhakrishnan J, Srinivasan A.  1998.  Improved bounds and algorithms for hypergraph two-coloring. 39th Annual Symposium on Foundations of Computer Science, 1998. Proceedings. :684-693.
Rao Y, Mundur P, Yesha Y.  2004.  Automatic video summarization for wireless and mobile environments. 2004 IEEE International Conference on Communications. 3:1532-1536Vol.3-1532-1536Vol.3.
Roussopoulos N.  1982.  The Logical Access Path Schema of a Database. IEEE Transactions on Software Engineering. SE-8(6):563-573.
Roussopoulos N, Faloutsos C, Sellis T.  1988.  An efficient pictorial database system for PSQL. IEEE Transactions on Software Engineering. 14(5):639-650.
Ryu KD, Hollingsworth J.  2004.  Unobtrusiveness and efficiency in idle cycle stealing for PC grids. Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International.
S
Sen P, Deshpande A, Getoor L.  2007.  Representing Tuple and Attribute Uncertainty in Probabilistic Databases. Seventh IEEE International Conference on Data Mining Workshops, 2007. ICDM Workshops 2007. :507-512.
Seo J, Shneiderman B.  2004.  A Rank-by-Feature Framework for Unsupervised Multidimensional Data Exploration Using Low Dimensional Projections. IEEE Symposium on Information Visualization, 2004. INFOVIS 2004. :65-72.
Shen E, Elaine Shi, Waters B.  2009.  Predicate Privacy in Encryption Systems. Theory of Cryptography. 5444:457-473.
Sherwood R, Bhattacharjee B, Srinivasan A.  2002.  P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
Elaine Shi, Niu Y, Jakobsson M, Chow R.  2011.  Implicit Authentication through Learning User Behavior. Information Security. 6531:99-113.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Elaine Shi, Chan T, Stefanov E, Li M.  2011.  Oblivious RAM with O((logN)^3) Worst-Case Cost. Advances in Cryptology – ASIACRYPT 2011. 7073:197-214.
Shneiderman B, Rao R, Andrews K, Ahlberg C, Brodbeck D, Jewitt T, Mackinlay J.  2005.  Turning information visualization innovations into commercial products: lessons to guide the next success. IEEE Symposium on Information Visualization, 2005. INFOVIS 2005. :241-244.

Pages