Publications

Export 3364 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
1998
Stewart G.W.  1998.  On the adjugate matrix. Linear Algebra and its Applications. 283(1–3):151-164.
Spring N, Wolski R.  1998.  Application level scheduling of gene sequence comparison on metacomputers. Proceedings of the 12th international conference on Supercomputing. :141-148.
Kanungo T, Mount D, Netanyahu NS, Piatko C, Silverman R, Wu AY.  1998.  Approximating large convolutions in digital images. PROCEEDINGS-SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING. :216-227.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Mount D, Silverman R, Wu AY.  1998.  On the Area of Overlap of Translated Polygons. CS-TR-3201
Slaughter L, Norman KL, Shneiderman B.  1998.  Assessing users' subjective satisfaction with the Information System for Youth Services (ISYS). Institute for Systems Research Technical Reports.
Slaughter L, Norman KL, Shneiderman B.  1998.  Assessing users' subjective satisfaction with the Information System for Youth Services (ISYS). Institute for Systems Research Technical Reports.
Arbaugh WA, Keromytis AD, Farber DJ, Smith JM.  1998.  Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
Stewart G.W.  1998.  Basic decompositions. 1
Shen W, Dorr BJ.  1998.  Bilingual Lexicon Construction Using Large Corpora.
Liao H, Osada M, Shneiderman B.  1998.  Browsing Unix Directories With Dynamic Queries: An Evaluation of Three Information Display Techniques. Technical Reports of the Computer Science Department.
Ellis J, Tran C, Ryoo J, Shneiderman B.  1998.  Buttons vs. menus: An exploratory study of pull-down menu selection as compared to button bars. Technical Reports of the Computer Science Department.
Sinha R, Paredis CJJ, Gupta SK, Khosla PK.  1998.  Capturing articulation in assemblies from component geometry.
Shneiderman B.  1998.  Codex, Memex, Genex: The Pursuit of Transformational Technologies. International Journal of Human-Computer Interaction. 10(2):87-106.
Reggia JA, Goodall S, Shkuro Y.  1998.  Computational studies of lateralization of phoneme sequence generation. Neural Computation. 10(5):1277-1297.
Oleary DP, Stewart G.W.  1998.  On the convergence of a new Rayleigh quotient method with applications to large eigenproblems. Electronic Transactions on Numerical Analysis. 7:182-189.
Li J, Plaisant C, Shneiderman B.  1998.  Data object and label placement for information abundant visualizations. Proceedings of the 1998 workshop on New paradigms in information visualization and manipulation. :41-48.
Shock CT, Chang C, Moon B, Acharya A, Davis LS, Saltz J, Sussman A.  1998.  The design and evaluation of a high-performance earth science database. Parallel Computing. 24(1):65-89.
Shock CT, Chang C, Moon B, Acharya A, Davis LS, Saltz J, Sussman A.  1998.  The design and evaluation of a high-performance earth science database. Parallel Computing. 24(1):65-89.
Shock CT, Chang C, Moon B, Acharya A, Davis LS, Saltz J, Sussman A.  1998.  The design and evaluation of a high-performance earth science database. Parallel Computing. 24(1):65-89.
Shneiderman B, Plaisant C, Botafogo R, Hopkins D, Weiland W.  1998.  Designing to facilitate browsing: A look back at the Hyperties workstation browser. Technical Reports of the Computer Science Department, University of Maryland.
Arbaugh WA, Keromytis AD, Smith JM.  1998.  DHCP++: Applying an efficient implementation method for fail-stop cryptographic protocols. Proceedings of Global Internet (GlobeCom)’98. :59-65.
Afework A, Beynon MD, Bustamante F, Cho S, Demarzo A, Ferreira R, Miller R, Silberman M, Saltz J, Sussman A et al..  1998.  Digital dynamic telepathology–the Virtual Microscope.. Proceedings of the AMIA Symposium. :912-912.

Pages