Publications

Export 7151 results:
Author Title Type [ Year(Asc)]
2007
Tom Yeh, Lee J, Darrell T.  2007.  Adaptive Vocabulary Forests br Dynamic Indexing and Category Learning. Computer Vision, 2007. ICCV 2007. IEEE 11th International Conference on. :1-8.
Udrea O, Majkić Z, Subrahmanian V.  2007.  Aggregates in Generalized Temporally Indeterminate Databases. Scalable Uncertainty ManagementScalable Uncertainty Management. 4772:171-186.
Memon AM, Xie Q.  2007.  Agile Quality Assurance Techniques for GUI-Based Applications. Agile software development quality assuranceAgile software development quality assurance. :114-114.
Peng T, Balijepalli A, Gupta SK, LeBrun T.  2007.  Algorithms for on-line monitoring of micro spheres in an optical tweezers-based assembly cell. Journal of Computing and Information Science in Engineering. 7:330-330.
Lu Y, Bulka B, desJardins M, Freeland SJ.  2007.  Amino acid quantitative structure property relationship database: a web-based platform for quantitative investigations of amino acids. Protein Engineering Design and SelectionProtein Engineering, Design and Selection. 20(7):347-351.
Varna AL, He S, Swaminathan A, M. Wu.  2007.  Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 2:II-133-II-136-II-133-II-136.
Lee C-R, Stewart G.W.  2007.  Analysis of the Residual Arnoldi Method. UMIACS-TR-2007-45
Hicks MW.  2007.  Analyzing information flow. Conference on Programming Language Design and Implementation: Proceedings of the 2007 workshop on Programming languages and analysis for security.
Demner-Fushman D, Jimmy Lin.  2007.  Answering Clinical Questions with Knowledge-Based and Statistical Techniques. Computational Linguistics. 33(1):63-103.
Zhou SK, Aggarwal G, Chellappa R, Jacobs DW.  2007.  Appearance Characterization of Linear Lambertian Objects, Generalized Photometric Stereo, and Illumination-Invariant Face Recognition. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 29(2):230-245.
Srivastava S, Hicks MW, Foster JS.  2007.  Appendix to CMod: Modular Information Hiding and Type-Safe Linking for C. Technical Reports of the Computer Science Department.
Josyula DP, Fults S, Anderson ML, Wilson S, Perlis D.  2007.  Application of MCL in a dialog agent. Third Language and Technology Conference.
Katz J, Yung M.  2007.  Applied cryptography and network security: 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007: proceedings. 4521
Condon E, Cukier M, He T.  2007.  Applying Software Reliability Models on Security Incidents. :159-168.
Srinivasan A.  2007.  Approximation algorithms for stochastic and risk-averse optimization. Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms. :1305-1313.
Rosenfeld SN, Rus I, Cukier M.  2007.  Archetypal behavior in computer security. Journal of Systems and Software. 80(10):1594-1606.
Grube NE, Taylor EM, Martin, M.P.  2007.  Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198
Rawlings TK, Ruiz GM, Colwell RR.  2007.  Association of Vibrio Cholerae O1 El Tor and O139 Bengal with the Copepods Acartia Tonsa and Eurytemora Affinis. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 73(24):7926-7933.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Brooks PA, Memon AM.  2007.  Automated gui testing guided by usage profiles. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :333-342.
Zhu G, Doermann D.  2007.  Automatic Document Logo Detection. The 9th International Conference on Document Analysis and Recognition (ICDAR 2007). :864-868.
Tabatabaee V, Hollingsworth J.  2007.  Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
Brabec F, Samet H.  2007.  Autonomic computing. IEEE internet computing. 11(1):52-59.
Lee S, Levin D, Gopalakrishnan V, Bhattacharjee B.  2007.  Backbone construction in selfish wireless networks. Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :121-132.
Froehlich J, Wobbrock JO, Kane SK.  2007.  Barrier pointing: using physical edges to assist target acquisition on mobile device touch screens. Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, October. :15-17.

Pages