Publications

Export 7151 results:
Author Title Type [ Year(Asc)]
Filters: Efficient-model-checking-buchi-tableau-automata%E2%8B%86 is   [Clear All Filters]
2006
Bright L, Gal A, Raschid L.  2006.  Adaptive pull-based policies for wide area data delivery. ACM Transactions on Database Systems (TODS). 31(2):631-671.
Broadwater J, Chellappa R.  2006.  An Adaptive Threshold Method for Hyperspectral Target Detection. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
Karagol-Ayan B, Doermann D, Weinberg A.  2006.  Adaptive Transformation-based Learning for Improving Dictionary Tagging. Proceedings of the 11th Conference on European Chapter of the Association for Computational Linguistics. :257-264.
Boyd-Graber J, Fellbaum C, Osherson D, Schapire R.  2006.  Adding dense, weighted connections to wordnet. Proceedings of the Third International WordNet Conference. :29-36.
Zelkowitz MV, Tseng C-W.  2006.  Advances in Computers: Computational Biology and Bioinformatics.
Kashyap S, Khuller S.  2006.  Algorithms for non-uniform size data placement on parallel disks. Journal of Algorithms. 60(2):144-167.
Peng T, Balijepalli A, Gupta SK, LeBrun TW.  2006.  Algorithms for on-line monitoring of components in an optical tweezers-based assembly cell. :1-13.
Kalsi A, O'Leary DP.  2006.  Algorithms for Structured Total Least Squares Problems with Applications to Blind Image Deblurring. Journal of Research of the National Institute of Standards and Technology. 111(2):113-119.
Seligman M, Fall K, Mundur P.  2006.  Alternative custodians for congestion control in delay tolerant networks. Proceedings of the 2006 SIGCOMM workshop on Challenged networks. :229-236.
Wu CT, Elman H.  2006.  Analysis and comparison of geometric and algebraic multigrid for convection-diffusion equations. ANALYSIS. 28(6):2208-2228.
Wu M, Martin, M.P.  2006.  Analysis of Shock Motion in a Compression Ramp Configuration using DNS data. Bulletin of the American Physical Society.
Katz J, Smith A.  2006.  Analyzing the HB and HB+ protocols in the “large error” case. IACR ePrint report. 326:2006-2006.
Li Y, Zheng Y, Doermann D, Jaeger S.  2006.  ANew Algorithm for Detecting Text Line in Handwritten Documents. 10th International Workshop on Frontiers in Handwriting Recognition. :35-40.
Udrea O, Recupero D, V.S. Subrahmanian.  2006.  Annotated rdf. The Semantic Web: Research and Applications. 4011:487-501.
Meyers A, Fang AC, Ferro L, Kübler S, Jia-Lin T, Palmer M, Poesio M, Dolbey A, Schuler KK, Loper E et al..  2006.  Annotation compatibility working group report. Proceedings of the Workshop on Frontiers in Linguistically Annotated Corpora 2006. :38-53.
Bethencourt J, Chan H, Perrig A, Elaine Shi, Song D.  2006.  Anonymous multi-attribute encryption with range query and conditional decryption.
Yoon K, Harwood D, Davis LS.  2006.  Appearance-based person recognition using color/path-length profile. Journal of Visual Communication and Image Representation. 17(3):605-622.
Papamanthou C, Tollis IG.  2006.  Applications of Parameterized st-Orientations in Graph Drawing Algorithms. Graph Drawing. :355-367.
Fraser T, Petroni J., Arbaugh WA.  2006.  Applying flow-sensitive CQUAL to verify MINIX authorization check placement. Proceedings of the 2006 workshop on Programming languages and analysis for security. :3-6.
Chu D, Deshpande A, Hellerstein JM, Hong W.  2006.  Approximate Data Collection in Sensor Networks using Probabilistic Models. Proceedings of the 22nd International Conference on Data Engineering, 2006. ICDE '06. :48-48.
Rohloff KR, Khuller S, Kortsarz G.  2006.  Approximating the minimal sensor selection for supervisory control. Discrete Event Dynamic Systems. 16(1):143-170.
Gandhi R, Khuller S, Srinivasan A, Wang N.  2006.  Approximation algorithms for channel allocation problems in broadcast networks. Networks. 47(4):225-236.
Tahmoush D, Samet H.  2006.  Archimedes, an archive of medical images. American Medical Informatics Association 2006 Annual Symposium Proceedings Biomedical and Health Informatics: From Foundations to Applications to Policy, Washington, DC, DW Bates, JH Holmes, and G. Kuperman, editors.
Pal P, Rubel P, Atighetchi M, Webber F, Sanders WH, Seri M, Ramasamy HG, Lyons J, Courtney T, Agbaria A et al..  2006.  An architecture for adaptive intrusion-tolerant applications. Software: Practice and Experience. 36(11-12):1331-1354.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.

Pages