Publications
Export 7151 results:
Author [ Title] Type Year Filters: End-zero-hit-queries-query-previews-nasa%E2%80%99s-global-change-master-directory is [Clear All Filters]
1997. Using content-derived names for configuration management. ACM SIGSOFT Software Engineering Notes. 22(3):104-109.
2002. On using correlation-based synopses during query optimization. Computer Science Division (EECS), University of California Berkeley.
1993. Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
2004. Using distributed partial memories to improve self-organizing collective movements. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 34(4):1697-1707.
2005. Using Dynamic Tracing Sampling to Measure Long Running Programs. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :59–-59–.
1998. Using elastic windows for World-Wide Web Browsing. CHI 98 conference summary on Human factors in computing systems. :189-190.
2000. Using Feature Hierarchies in Bayesian Network Learning. Abstraction, Reformulation, and Approximation. 1864:260-270.
1988. Using flow field divergence for obstacle avoidance in visual navigation. Science Applications International Corp, Proceedings: Image Understanding Workshop,. 2
2010. Using friendship ties and family circles for link prediction. Advances in Social Network Mining and Analysis. :97-113.
2009. Using Graphics Processors for High-Performance Computation and Visualization of Plasma Turbulence. Computing in Science Engineering. 11(2):52-59.
2007. Using GUI Run-Time State as Feedback to Generate Test Cases. Software Engineering, 2007. ICSE 2007. 29th International Conference on. :396-405.
2004. Using Hardware Counters to Automatically Improve Memory Performance. Proceedings of the 2004 ACM/IEEE conference on Supercomputing. :46–-46–.
2000. Using hardware performance monitors to isolate memory bottlenecks. Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM). :40-40.
2000. Using Hilbert curve in image storing and retrieving. Proceedings of the 2000 ACM workshops on Multimedia - MULTIMEDIA '00. :167-170.
2006. Using image similarity and asymmetry to detect breast cancer. Proc. of SPIE Vol. 6144:61441S–1-61441S–1.
2002. Using independent auditors as intrusion detection systems. Information and Communications Security. :291-302.
1995. Using information content to evaluate semantic similarity in a taxonomy. Arxiv preprint cmp-lg/9511007.
1999. Using Interactive Visualizations of WWW Log Data to Characterize Access Patterns and Inform Site Design. Institute for Systems Research Technical Reports.
2001. Using interactive visualizations of WWW log data to characterize access patterns and inform site design. Journal of the American Society for Information Science and Technology. 52(4):331-343.