Publications

Export 228 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Title is U  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Z
Zhu G, Yu X, Li Y, Doermann D.  2008.  Unconstrained Language Identification Using AShape Codebook. The 11th International Conference on Frontiers in Handwritting Recognition (ICFHR 2008). :13-18.
Zhu Y, Bavier A, Feamster N, Rangarajan S, Rexford J.  2008.  UFO: a resilient layered routing architecture. ACM SIGCOMM Computer Communication Review. 38(5):59-62.
Zhou KS, Chellappa R, Zhao W.  2006.  Unconstrained face recognition.
Zheleva E, Getoor L, Golbeck J, Kuter U.  2010.  Using friendship ties and family circles for link prediction. Advances in Social Network Mining and Analysis. :97-113.
Zhai K, Boyd-Graber J, Asadi N.  2011.  Using Variational Inference and MapReduce to Scale Topic Modeling. arXiv:1107.3765.
Zelkowitz MV.  1993.  Use of an environment classification model. Proceedings of the 15th international conference on Software Engineering. :348-357.
Zelkowitz MV, Rus I.  2001.  Understanding IV & V in a safety critical and complex evolutionary environment: the NASA space shuttle program. Proceedings of the 23rd International Conference on Software Engineering. :349-357.
Zelkowitz MV.  2009.  An update to experimental models for validating computer technology. Journal of Systems and Software. 82(3):373-376.
Zajic D, Dorr BJ, Jimmy Lin, Schwartz R.  2005.  Umd/bbn at mse2005. Proceedings of the MSE2005 track of the Association for Computational Linguistics Workshop on Intrinsic and Extrinsic Evaluation Meatures for MT and/or Summarization, Ann Arbor, MI.
X
Xie Q, Memon AM.  2008.  Using a pilot study to derive a GUI model for automated testing. ACM Transactions on Software Engineering and Methodology (TOSEM). 18(2):7:1–7:35-7:1–7:35.
W
Winder R, Reggia JA.  2004.  Using distributed partial memories to improve self-organizing collective movements. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 34(4):1697-1707.
V
Vishkin U.  2011.  Using simple abstraction to reinvent computing for parallelism. Commun. ACM. 54(1):75-85.
Verma R, Peters NR, D'Onofrio M, Tochtrop GP, Sakamoto KM, Varadan R, Zhang M, Coffino P, Fushman D, Deshaies RJ et al..  2004.  Ubistatins Inhibit Proteasome-Dependent Degradation by Binding the Ubiquitin Chain. Science. 306(5693):117-120.
Varadan R, Assfalg M, Fushman D.  2005.  Using NMR Spectroscopy to Monitor Ubiquitin Chain Conformation and Interactions with Ubiquitin‐Binding Domains. Ubiquitin and Protein Degradation, Part B. Volume 399:177-192.
Vanniamparampil AJ, Shneiderman B, Plaisant C, Rose A.  1998.  User Interface Reengineering: A Diagnostic Approach. Technical Reports of the Computer Science Department.
U
Zaitchik B.F, Guikema S.D, Haley B.J, Taviani E., Chen A., Brown M.E., Huq A., Colwell RR.  2015.  Use of Environmental Parameters to Model Pathogenic Vibrios in Chesapeake Bay. Journal of Environmental Informatics.
T
Tuzo J, Seymour J, desJardins M, others.  2011.  Using Agent-Based Simulation to Determine an Optimal Lane-Changing Strategy on a Multi-Lane Highway. 2011 AAAI Fall Symposium Series.
Turaga P, Veeraraghavan A, Chellappa R.  2009.  Unsupervised view and rate invariant clustering of video sequences. Computer Vision and Image Understanding. 113(3):353-371.
Tsui C-jung, Wang P, Fleischmann K, Oard D, Sayeed A.  2009.  Understanding IT Innovations Through Computational Analysis of Discourse. ICIS 2009 Proceedings.
Tran S, Lin Z, Harwood D, Davis LS.  2008.  UMD_VDT, an Integration of Detection and Tracking Methods for Multiple Human Tracking. Multimodal Technologies for Perception of Humans. :179-190.
Tikir MM, Hollingsworth J.  2004.  Using Hardware Counters to Automatically Improve Memory Performance. Proceedings of the 2004 ACM/IEEE conference on Supercomputing. :46–-46–.
Tanin E, Harwood A, Samet H.  2007.  Using a distributed quadtree index in peer-to-peer networks. The VLDB Journal. 16(2):165-178.

Pages