Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Filters: Block-preconditioners-discrete-incompressible-navier%E2%80%93stokes-equations is   [Clear All Filters]
Book Chapters
North C, Shneiderman B, Plaisant C, Kang H, Bederson BB.  2003.  Seeing the World Through Image Libraries. The craft of information visualization: readings and reflectionsThe craft of information visualization: readings and reflections. :47-47.
Dachman-Soled D, Kalai YTauman.  2012.  Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
Dachman-Soled D, Malkin T, Raykova M, Yung M.  2011.  Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2005.  Scheduling on Unrelated Machines Under Tree-Like Precedence Constraints. Approximation, Randomization and Combinatorial Optimization. Algorithms and TechniquesApproximation, Randomization and Combinatorial Optimization. Algorithms and Techniques. 3624:609-609.
Plaisant C, Shneiderman B, Battagtia J.  1993.  Scheduling home control devices: a case study of the transition from the research project to a product. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :205-205.
Anagnostakis K, Hicks MW, Ioannidis S, Keromytis A, Smith J.  2000.  Scalable Resource Control in Active Networks. Active NetworksActive Networks. 1942:343-357.
Hicks MW, Weirich S, Crary K.  2001.  Safe and Flexible Dynamic Linking of Native Code. Types in Compilation. 2071:147-176.
Rajagopalan AN, Chellappa R, Koterba N.  2003.  Robust Face Recognition in the Presence of Clutter. Audio- and Video-Based Biometric Person AuthenticationAudio- and Video-Based Biometric Person Authentication. 2688:1062-1062.
Konte M, Feamster N.  2012.  Re-wiring Activity of Malicious Networks. Passive and Active MeasurementPassive and Active Measurement. 7192:116-125.
Tulyakov S, Jaeger S, Govindaraju V, Doermann D.  2008.  Review of Classifier Combination Methods. Studies in Computational Intelligence: Machine Learning in Document Analysis and RecognitionStudies in Computational Intelligence: Machine Learning in Document Analysis and Recognition. :361-386.
Hollingsworth J, Keleher PJ, Ryu KD.  2000.  Resource-aware meta-computing. Emphasizing Distributed SystemsEmphasizing Distributed Systems. Volume 53:109-169.
Aris A, Shneiderman B, Plaisant C, Shmueli G, Jank W.  2005.  Representing Unevenly-Spaced Time Series Data for Visualization and Interactive Exploration. Human-Computer Interaction - INTERACT 2005Human-Computer Interaction - INTERACT 2005. 3585:835-846.
Keil-Slawik R, Plaisant C, Shneiderman B.  1993.  Remote direct manipulation: A case study of a telemedicine workstation. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :51-51.
Agrawala AK, CILINGIROGLU A, Lee S.  1997.  Regulation of Cable Television. The Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable SystemsThe Froehlich/Kent Encyclopedia of Telecommunications: Volume 15-Radio Astronomy to Submarine Cable Systems. 15:84-84.
Everett L, Hansen M, Hannenhalli S.  2010.  Regulating the Regulators: Modulators of Transcription Factor Activity. Computational Biology of Transcription Factor BindingComputational Biology of Transcription Factor Binding. 674:297-312.
O'Leary DP.  1994.  Regularization of Ill-Posed Problems in Image Restoration. Proceedings of the Fifth SIAM Conference on Applied Linear AlgebraProceedings of the Fifth SIAM Conference on Applied Linear Algebra. :102-105.
Hansen P C, O'Leary DP.  1997.  Regularization algorithms based on total least squares. Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996)Recent advances in total least squares techniques and errors-in-variables modeling (Leuven, 1996). :127-137.
Ramanathan N, Chellappa R.  2007.  Recognizing Faces Across Age Progression. Face Biometrics for Personal IdentificationFace Biometrics for Personal Identification. :27-42.
Pemmaraju S, Srinivasan A.  2008.  The Randomized Coloring Procedure with Symmetry-Breaking. Automata, Languages and ProgrammingAutomata, Languages and Programming. 5125:306-319.
Srinivasan A.  2007.  Randomized Algorithms and Probabilistic Analysis in Wireless Networking. Stochastic Algorithms: Foundations and ApplicationsStochastic Algorithms: Foundations and Applications. 4665:54-57.
Hori O, Doermann D.  1996.  Quantitative Measurement of the Performance of Raster-to-vector Conversion Algorithms. Graphics Recognition: Methods and ApplicationsGraphics Recognition: Methods and Applications. :57-68.
Basili VR, Zelkowitz MV, Sjøberg DIK, Johnson P, Cowling AJ.  2007.  Protocols in the use of empirical software engineering artifacts. Empirical Software EngineeringEmpirical Software Engineering. 12:107-119.
Memon AM.  2005.  A process and role-based taxonomy of techniques to make testable COTS components. Testing Commercial-Off-The-Shelf Components And SystemsTesting Commercial-Off-The-Shelf Components And Systems. :109-140.
Getoor L, Friedman N, Koller D, Pfeffer A, Taskar B.  2007.  Probabilistic Relational Models. Introduction to Statistical Relational LearningIntroduction to Statistical Relational Learning. :129-129.
Udrea O, Yu D, Hung E, Subrahmanian V.  2005.  Probabilistic Ontologies and Relational Databases. On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASEOn the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE. 3760:1-17.

Pages