Publications
Export 7151 results:
Author [ Title] Type Year Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is [Clear All Filters]
2012. Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
1998. Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
2011. Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries. New Horizons in Evolutionary Robotics. 341:171-193.
2007. Automated gui testing guided by usage profiles. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :333-342.
2004. Automated GUI regression testing using AI planning. Artificial Intelligence Methods in Software TestingArtificial Intelligence Methods in Software Testing. :51-99.
2010. Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP). :265-272.
2007. Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
2001. Automated design of sheet metal punches for bending multiple parts in a single setup. Robotics and Computer-Integrated Manufacturing. 17(1–2):33-47.
2002. Automated design of multi-stage molds for manufacturing multi-material objects. Journal of Mechanical Design. 124:399-399.
2008. Automated design of distributed control rules for the self-assembly of prespecified artificial structures. Robotics and Autonomous Systems. 56(4):334-359.
2004. Automated cluster-based Web service performance tuning. 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. :36-44.
2008. Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
2008. Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
2010. Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
2008. Augmenting spatio-textual search with an infectious disease ontology. Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International Conference on. :266-269.