Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
Filters: Filter is   [Clear All Filters]
1998
Kuah B-T, Shneiderman B.  1998.  Providing Advisory Notices for UNIX Command Users: Design, Implementation, and Empirical Evaluations. Technical Reports of the Computer Science Department.
Stewart G.W.  1998.  QR Sometimes Beats Jacobi. UMIACS-TR-95-32
Helman DR, Bader DA, JaJa JF.  1998.  A Randomized Parallel Sorting Algorithm with an Experimental Study. Journal of Parallel and Distributed Computing. 52(1):1-23.
Shneiderman B.  1998.  Reflections on authoring, editing and managing hypertex. Technical Reports of the Computer Science Department.
Shneiderman B.  1998.  Relate–Create–Donate: a teaching/learning philosophy for the cyber-generation. Computers & Education. 31(1):25-39.
Nagy JG, O'Leary DP.  1998.  Restoring Images Degraded by Spatially Variant Blur. SIAM Journal on Scientific Computing. 19(4):1063-1082.
Von Matt U, Stewart G.W.  1998.  Rounding Errors in Solving Block Hessenberg Systems. UMIACS-TR-94-105
Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
Kim Y, Patro R, Ip CY, O’Leary DP, Anishkin A, Sukharev S, Varshney A.  1998.  Salient Frame Detection for Molecular Dynamics Simulations. Scientific Visualization: Interactions, Features, Metaphors. 2:160-175.
Bader DA, JaJa JF, Chellappa R.  1998.  Scalable Data Parallel Algorithms for Texture Synthesis and Compression using Gibbs Random Fields. UMIACS-TR-93-80
Choi S, Agrawala AK.  1998.  Scheduling Aperiodic and Sporadic Tasks in Hard Real-Time Systems. Technical Reports from UMIACS, UMIACS-TR-97-44.
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM.  1998.  A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
Arbaugh WA, Davin JR, Farber DJ, Smith JM.  1998.  Security for virtual private intranets. Computer. 31(9):48-55.
Brodsky T, Fermüller C, Aloimonos Y.  1998.  Self-calibration from image derivatives. Sixth International Conference on Computer Vision, 1998. :83-89.
Reggia JA, Lohn JD, Chou HH.  1998.  Self-replicating structures: evolution, emergence, and computation. Artificial Life. 4(3):283-302.
Lobo J, Minker J, Rajasekar A.  1998.  Semantics for Disjunctive and Normal Disjunctive Logic Programs. Handbook of logic in artificial intelligence and logic programming. 5:325-325.
Kolda TG, O'Leary DP.  1998.  A semidiscrete matrix decomposition for latent semantic indexing information retrieval. ACM Trans. Inf. Syst.. 16(4):322-346.
Brodsky T, Fermüller C, Aloimonos Y.  1998.  Shape from video: Beyond the epipolar constraint. Proceedings of the DARPA Image Understanding Workshop.
Brodský T, Fermüller C, Aloimonos Y.  1998.  Simultaneous estimation of viewing geometry and structure. Computer Vision — ECCV'98Computer Vision — ECCV'98. 1406:342-358.
McDonnell JM, Fushman D, Cahill SM, Zhou W, Wolven A, Wilson CB, Nelle TD, Resh MD, Wills J, Cowburn D.  1998.  Solution structure and dynamics of the bioactive retroviral M domain from rous sarcoma virus. Journal of Molecular Biology. 279(4):921-928.
Fushman D, Najmabadi-Haske T, Cahill S, Zheng J, LeVine H, Cowburn D.  1998.  The Solution Structure and Dynamics of the Pleckstrin Homology Domain of G Protein-coupled Receptor Kinase 2 (β-Adrenergic Receptor Kinase 1) A BINDING PARTNER OF Gβγ SUBUNITS. Journal of Biological ChemistryJ. Biol. Chem.. 273(5):2835-2843.
Shneiderman B, Byrd D, Croft BW.  1998.  Sorting out searching: a user-interface framework for text searches. Communications of the ACM. 41(4):95-98.
Jategaonkar Jagadeesan L, Porter A, Puchol C, Ramming JC, Votta LG.  1998.  Specification-based Testing of Reactive Software: A Case Study in Technology Transfer. Journal of Systems and Software. 40(3):249-262.
Revett K, Ruppin E, Goodall S, Reggia JA.  1998.  Spreading depression in focal ischemia: A computational study. Journal of Cerebral Blood Flow & Metabolism. 18(9):998-1007.
Bai Z, Stewart G.W.  1998.  SRRIT--A FORTRAN Subroutine to Calculate the Dominant Invariant Subspace of a Nonsymmetric Matrix. UMIACS-TR-92-61

Pages