Publications
Export 7148 results:
[ Author] Title Type Year Filters: End-zero-hit-queries-query-previews-nasa%E2%80%99s-global-change-master-directory is [Clear All Filters]
1999. Coverage estimation methods for stratified fault-injection. Computers, IEEE Transactions on. 48(7):707-723.
2009. Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. Security Privacy, IEEE. 7(1):42-48.
1999. Fault injection based on a partial view of the global state of a distributed system. :168-177.
1998. Frequentist and Bayesian Coverage Estimations for Stratified Fault-Injection. DEPENDABLE COMPUTING AND FAULT TOLERANT SYSTEMS. 11:43-62.
1998. AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
2001. Reading between the lines: Lessons from the SDMI challenge. Proceedings of the 10th USENIX Security Symposium. :13-17.
2001. What can we reasonably expect from watermarks? Applications of Signal Processing to Audio and Acoustics, 2001 IEEE Workshop on the. :223-226.
2008. Indexing planar point quartets via geometric attributes. Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems. :71:1–71:4-71:1–71:4.
2006. Efficient position-independent iconic search using an R-theta index. Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems. :27-34.
2007. Indexing Point Triples Via Triangle Geometry. Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on. :936-945.
2007. Recovery in culture of viable but nonculturable Vibrio parahaemolyticus: regrowth or resuscitation? The ISME Journal. 1(2):111-120.
2009. Advancing User-Centered Evaluation of Visual Analytic Environments Through Contests. Information VisualizationInformation Visualization. 8(3):230-238.
2005. Detecting Independent 3D Movement. Handbook of Geometric ComputingHandbook of Geometric Computing. :383-401.
2006. Configuration and representation of large-scale dataflow graphs using the dataflow interchange format. Proceedings of the IEEE Workshop on Signal Processing Systems, Banff, Canada. :10-15.
2005. Path dependence and the validation of agent-based spatial models of land use. International Journal of Geographical Information Science. 19(2):153-174.
2007. Optimizing mpf queries. Proceedings of the 2007 ACM SIGMOD international conference on Management of data - SIGMOD '07. :701-701.
2005. A framework for set-oriented computation in inductive logic programming and its application in generalizing inverse entailment. Inductive Logic Programming. :69-86.
2000. Communication complexity of document exchange. Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms. :197-206.
2007. Combining provenance and security policies in a web-based document management system. On-line Proceedings of the Workshop on Principles of Provenance (PrOPr).
2009. Cross-tier, label-based security enforcement for web applications. Proceedings of the 35th SIGMOD international conference on Management of data. :269-282.