Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
Filters: Filter is   [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Wilkins DE, desJardins M.  2001.  A Call for Knowledge-Based Planning. AI Magazine. 22(1):99-99.
Chockler G, Dekel E, JaJa JF, Jimmy Lin.  2009.  Call for Papers: Special Issue of the Journal of Parallel and Distributed Computing: Cloud Computing. J. Parallel Distrib. Comput.. 69(9):813–-813–.
McMaster S, Memon AM.  2005.  Call stack coverage for test suite reduction. Software Maintenance, 2005. ICSM'05. Proceedings of the 21st IEEE International Conference on. :539-548.
McMaster S, Memon AM.  2008.  Call-Stack Coverage for GUI Test Suite Reduction. Software Engineering, IEEE Transactions on. 34(1):99-115.
Kashyap A, Bhattacharjee B, La R, Shayman M, Tabatabaee V.  2006.  CAM04-6: Single-Path Routing of Time-varying Traffic. Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE. :1-6.
Ilghami O, Nau DS, Munoz-Avila H, Aha DW.  2002.  CaMeL: Learning method preconditions for HTN planning. :131-14.
Agrawal M, Davis LS.  2003.  Camera calibration using spheres: a semi-definite programming approach. Computer Vision, 2003. Proceedings. Ninth IEEE International Conference on. :782-789vol.2-782-789vol.2.
Liu X, Doermann D, Li H.  2008.  Camera Phone Based Tools for People with Visual Impairments. The First International Workshop on Mobile Multimedia Processing.
Liang J, Doermann D, Li H.  2005.  Camera-Based Analysis of Text and Documents: ASurvey. International Journal on Document Analysis and Recognition. 7(2+3):83-104.
Liang J, DeMenthon D, Doermann D.  2006.  Camera-Based Document Image Mosaicing. ICPR'06. :476-479.
Cho S, Zwick A, Regier JC, Mitter C, Cummings MP, Yao J, Du Z, Zhao H, Kawahara AY, Weller S et al..  2011.  Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? Systematic BiologySyst Biol. 60(6):782-796.
Ramachandran A, Dagon D, Feamster N.  2006.  Can DNS-based blacklists keep up with bots. Conference on email and anti-spam.
Feamster N, Gray A.  2008.  Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
Feamster N.  2006.  Can Information from End Systems Improve Routing. Proceedings of the Workshop on Internet Routing Evolution and Design.
Dachman-Soled D, Mahmoody M, Malkin T.  2014.  Can Optimally-Fair Coin Tossing Be Based on One-Way Functions? Theory of Cryptography. :217-239.
Vishkin U.  1996.  Can parallel algorithms enhance serial implementation? Communications of the ACM. 39(9):88-91.
Vishkin U.  1991.  Can parallel algorithms enhance serial implementation? Parallel Processing Symposium, 1994. Proceedings., Eighth International. :376-385.
Čomić L, De Floriani L.  2008.  Cancellation of critical points in 2D and 3D Morse and Morse-Smale complexes. Discrete Geometry for Computer Imagery. :117-128.
Luo Y, Duraiswami R.  2008.  Canny edge detection on NVIDIA CUDA. Computer Vision and Pattern Recognition Workshops, 2008. CVPRW '08. IEEE Computer Society Conference on. :1-8.
Dachman-Soled D, Servedio RA.  2011.  A Canonical Form for Testing Boolean Function Properties. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :460-471.
O'Leary DP, Widlund O.  1979.  Capacitance Matrix Methods for the Helmholtz Equation on General Three Dimensional Regions. Mathematics of Computation. 33:849-879.
Khuller S, Sussmann YJ.  2000.  The capacitated k-center problem. SIAM Journal on Discrete Mathematics. 13:403-403.
Chafekar D, Levin D, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
Chafekar D, Anil Kumar V, Marathe M, Parthasarathy S, Srinivasan A.  2011.  Capacity of wireless networks under SINR interference constraints. Wireless Networks. 17(7):1605-1624.
Sliva A, V.S. Subrahmanian, Martinez V, Simari G.  2009.  CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. :253-269.

Pages