Publications
Export 7151 results:
Author [ Title] Type Year Filters: Efficient-model-checking-buchi-tableau-automata%E2%8B%86 is [Clear All Filters]
2002. P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
2011. P2C2: Programmable pixel compressive camera for high speed imaging. 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR). :329-336.
2009. P r DB: managing and exploiting rich correlations in probabilistic databases. The VLDB Journal. 18(5):1065-1090.
1994. P element-mediated in vivo deletion analysis of white-apricot: deletions between direct repeats are strongly favored.. GeneticsGenetics. 136(3):1001-1011.
2002. OZONE: A zoomable interface for navigating ontology information. Proceedings of the Working Conference on Advanced Visual Interfaces. :139-143.
2011. Overview of the MPEG Reconfigurable Video Coding Framework. Journal of Signal Processing Systems. 63(2):251-263.
1991. An overview of Hyperties, its user interface and data model. Hypermedia/Hypertext And Object-Oriented Databases. Chapman & Hall. :17-31.
1998. An overview of cooperative answering in databases. Flexible Query Answering Systems. :282-285.
1999. Overview+ detail. Readings in information visualizationReadings in information visualization. :285-286.
2003. Overlaying graph links on treemaps. IEEE Symposium on Information Visualization Conference Compendium (demonstration).
2010. Overlay Networking and Resiliency. Guide to Reliable Internet Services and Applications. :221-251.
2010. Overlap-based cell tracker. The Journal of Research of the National Institute of Standards and Technology. 115(6)
2006. Overconfidence or paranoia? search in imperfect-information games PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE. 21:1045-1045.
2010. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
1998. Overcoming Instability In Computing The Fundamental Matrix For A Markov Chain. SIAM Journal on Matrix Analysis and Applications. 19(2):534-540.
2006. Out–of–Core Multiresolution Terrain Modeling. Modeling and Management of Geographical Data over Distributed Architectures. Springer–Verlag.
2010. Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks. :37-42.
1987. An output sensitive algorithm for computing visibility graphs. Foundations of Computer Science, 1987., 28th Annual Symposium on. :11-19.
2007. Out-of-core Multi-resolution Terrain Modeling. Spatial data on the Web: modeling and management. :43-43.
2005. An outdoor 3-D visual tracking system for the study of spatial navigation and memory in rhesus monkeys. Behavior Research Methods. 37(3):453-463.
1999. OSMA Software Program: Domain Analysis Guidebook. Technical Reports from UMIACS, UMIACS-TR-99-16.