Publications
Export 7151 results:
Author Title [ Type] Year Filters: Believe-me%E2%80%94we-can-do-annotating-persuasive-acts-blog-text is [Clear All Filters]
2005. Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. :29-29.
2008. Exploiting ontology structure and patterns of annotation to mine significant associations between pairs of controlled vocabulary terms. Data Integration in the Life Sciences. :44-60.
2004. Exploiting multiple paths to express scientific queries. 16th International Conference on Scientific and Statistical Database Management, 2004. Proceedings. :357-360.
2003. Exploiting Functional Decomposition for Efficient Parallel Processing of Multiple Data Analysis Queries. Parallel and Distributed Processing Symposium, International. :81a-81a.
2005. Exploiting Correlated Attributes in Acquisitional Query Processing. 21st International Conference on Data Engineering, 2005. ICDE 2005. Proceedings. :143-154.
2000. Exploiting concurrency in a DBMS implementation for production systems. Proceedings of the first international symposium on Databases in parallel and distributed systems. :34-45.
2007. Exploiting approximate transitivity of trust. Broadband Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth International Conference on. :515-524.
1998. Explicit Multi-Threading (XMT) bridging models for instruction parallelism (extended abstract). Proceedings of the tenth annual ACM symposium on Parallel algorithms and architectures. :140-151.
1992. Experiments on the concurrent rule execution in database systems. Tools with Artificial Intelligence, 1992. TAI'92, Proceedings., Fourth International Conference on. :405-412.
1975. Experimental testing in programming languages, stylistic considerations and design techniques. Proceedings of the May 19-22, 1975, national computer conference and exposition. :653-656.
1995. Experimental software engineering: A report on the state of the art. INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING. 17:277-277.
1995. Experimental investigation of high performance cognitive and interactive text filtering. , IEEE International Conference on Systems, Man and Cybernetics, 1995. Intelligent Systems for the 21st Century. 5:4398-4403vol.5-4398-4403vol.5.
2002. An experimental evaluation of linear and kernel-based methods for face recognition. Applications of Computer Vision, 2002. (WACV 2002). Proceedings. Sixth IEEE Workshop on. :13-18.
2003. An experimental evaluation of correlated network partitions in the Coda distributed file system. :273-282.
2002. Experimental Construction of Very Large Scale DNA Databases with Associative Search. DNA computing: 7th International Workshop on DNA-Based Computers, DNA 7, Tampa, FL, USA, June 10-13, 2001: revised papers. 7:231-231.
1994. An experiment to assess different defect detection methods for software requirements inspections. Proceedings of the 16th international conference on Software engineering. :103-112.
1994. Experiences with Constraint-based Array Dependence Analysis. Principles and practice of constraint programming: second international workshop, PPCP'94, Rosario, Orcas Island, WA, USA, May 2-4, 1994: proceedings. :312-312.
2002. Experiences with capsule-based active networking. DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :16-24.
2004. Experience with safe manual memory-management in cyclone. Proceedings of the 4th international symposium on Memory management. :73-84.
2001. An experience management system for a software engineering research organization. Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard. :29-35.
2003. Exemplar-based tracking and recognition of arm gestures. Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the 3rd International Symposium on. 2:656-661Vol.2-656-661Vol.2.
1999. Excentric labeling: dynamic neighborhood labeling for data visualization. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :512-519.
2010. Evolving viral marketing strategies. Proceedings of the 12th annual conference on Genetic and evolutionary computation. :1195-1202.