Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Bhatia R, Khuller S, Naor J(S).  2000.  The Loading Time Scheduling Problem. Journal of Algorithms. 36(1):1-33.
Bhatia S, Motiwala M, Muhlbauer W, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Hosting virtual networks on commodity hardware. GT-CS-07-10
Bhatia S, Motiwala M, Muhlbauer W, Mundada Y, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
Bhatia M, Chi P, Chong W, Josyula DP, Okamoto Y, Perlis D, Purang K.  2001.  Handling uncertainty with active logic. In Proceedings, AAAI Fall Symposium on Uncertainty in Computation.
Bhat G, Cleaveland R, Grumberg O.  1995.  Efficient on-the-fly model checking for CTL. , Tenth Annual IEEE Symposium on Logic in Computer Science, 1995. LICS '95. Proceedings. :388-397.
Bhat GS, Cleaveland R, Groce A.  2001.  Efficient Model Checking Via Buchi Tableau Automata⋆. Computer aided verification: 13th International conference, CAV 2001, Paris, France, July 18-22, 2001: proceedings. 2102:38-38.
Bhat G, Cleaveland R, L\üttgen G.  1997.  Dynamic priorities for modeling real-time. Proc. of the Formal Description Techniques and Protocol Specification, Testing and Verification (FORTE X/PSTV XVII’97). :321-336.
Bhat G, Cleaveland R, L\üttgen G.  1999.  A practical approach to implementing real-time semantics. Annals of Software Engineering. 7(1):127-155.
Bhat G, Cleaveland R.  1996.  Efficient model checking via the equational μ-calculus. , Eleventh Annual IEEE Symposium on Logic in Computer Science, 1996. LICS '96. Proceedings. :304-312.
Bhat G, Cleaveland R.  1996.  Efficient local model-checking for fragments of the modal $\mu$-calculus. Tools and Algorithms for the Construction and Analysis of Systems. :107-126.
Bhanu B, Govindaraju V.  2011.  Face Tracking and Recognition in a Camera Network. Multibiometrics for Human IdentificationMultibiometrics for Human Identification.
Bhanu B, Ratha NK, Kumar V, Chellappa R, Bigun J.  2007.  Guest Editorial: Special Issue on Human Detection and Recognition. Information Forensics and Security, IEEE Transactions on. 2(3):489-490.
Beynon MD, Sussman A, Catalyurek U, Kurc T, Saltz J.  2001.  Performance optimization for data intensive grid applications. Active Middleware Services, 2001. Third Annual International Workshop on. :97-105.
Beynon MD, Kurc T, Catalyurek U, Chang C, Sussman A, Saltz J.  2001.  Distributed processing of very large datasets with DataCutter. Parallel Computing. 27(11):1457-1478.
Beynon MD, Kurc T, Sussman A, Saltz J.  2002.  Optimizing execution of component-based applications using group instances. Future Generation Computer Systems. 18(4):435-448.
Beynon MD, Sussman A, Saltz J.  1999.  Performance impact of proxies in data intensive client-server applications. Proceedings of the 13th international conference on Supercomputing. :383-390.
Beynon MD, Kurc T, Sussman A, Saltz J.  2000.  Design of a Framework for Data-Intensive Wide-Area Applications. Heterogeneous Computing Workshop. :116-116.
Beynon MD, Sussman A, Kurc T, Catalyurek U, Saltz J.  2002.  Efficient Manipulation of Large Datasets on Heterogeneous Storage Systems. Parallel and Distributed Processing Symposium, International. 2:0084-0084.
Beynon M, Ferreira R, Kurc T, Sussman A, Saltz J.  2000.  DataCutter: Middleware for filtering very large scientific datasets on archival storage systems. NASA conference publication. :119-134.
Beynon M, Chang C, Catalyurek U, Kurc T, Sussman A, Andrade H, Ferreira R, Saltz J.  2002.  Processing large-scale multi-dimensional data in parallel and distributed environments. Parallel Computing. 28(5):827-859.
Bethencourt J, Elaine Shi, Song D.  2010.  Signatures of Reputation. Financial Cryptography and Data Security. 6052:400-407.
Bethencourt J, Chan H, Perrig A, Elaine Shi, Song D.  2006.  Anonymous multi-attribute encryption with range query and conditional decryption.
Bessière K, Newhagen JE, Robinson JP, Shneiderman B.  2006.  A model for computer frustration: the role of instrumental and dispositional factors on incident, session, and post-session frustration and mood. Computers in Human Behavior. 22(6):941-961.
Bessiere K, Ceaparu I, Lazar J, Robinson J, Shneiderman B.  2004.  Social and psychological influences on computer user frustration. Media access: Social and psychological dimensions of new technology useMedia access: Social and psychological dimensions of new technology use. :91-103.
Bessiere K, Ceaparu I, Lazar J, Robinson J, Shneiderman B.  2003.  Understanding Computer User Frustration: Measuring and Modeling the Disruption from Poor Designs. Technical Reports from UMIACS.

Pages