Publications

Export 7151 results:
Author Title Type [ Year(Asc)]
Filters: Some-history-conjugate-gradient-and-lanczos-algorithms-1948%E2%80%931976 is   [Clear All Filters]
2011
Ma K-K, Yit Phang K, Foster JS, Hicks MW.  2011.  Directed Symbolic Execution. Static AnalysisStatic Analysis. 6887:95-111.
Froehlich J, Larson E, Gupta S, Cohn G, Reynolds M, Patel S.  2011.  Disaggregated End-Use Energy Sensing for the Smart Grid. IEEE Pervasive Computing. 10(1):28-39.
Mesmoudi MM, De Floriani L, Magillo P.  2011.  Discrete Curvature Estimators: an Experimental Evaluation. DISI-TR-11-12
Sankaranarayanan AC, Chellappa R, Baraniuk RG.  2011.  Distributed Sensing and Processing for Multi-Camera Networks. Distributed Video Sensor NetworksDistributed Video Sensor Networks. :85-101.
Wagstrom P, Martino J, von Kaenel J, Chetty M, Thomas J, Jones L.  2011.  A Dive into Online Community Properties. CSCW '11. :725-728.
Ghodsi M, Liu B, Pop M.  2011.  DNACLUST: accurate and efficient clustering of phylogenetic marker genes. BMC Bioinformatics. 12(1):271-271.
Maniatis P, Akhawe D, Fall K, Elaine Shi, McCamant S, Song D.  2011.  Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
Kumar J, Pillai J, Doermann D.  2011.  Document Image Classification and Labeling using Multiple Instance Learning. Intl. Conf. on Document Analysis and Recognition (ICDAR 11). :1059-1063.
Gopalan R, Li R, Chellappa R.  2011.  Domain adaptation for object recognition: An unsupervised approach. 2011 IEEE International Conference on Computer Vision (ICCV). :999-1006.
Bhattacharyya SS, Plishker W, Shen C-C, Sane N, Zaki G.  2011.  The DSPCAD Integrative Command Line Environment: Introduction to DICE Version 1.1.
Shen C-C, Wang L-H, Cho I, Kim S, Won S, Plishker W, Bhattacharyya SS.  2011.  The DSPCAD Lightweight Dataflow Environment: Introduction to LIDE Version 0.1. Technical Reports from UMIACS.
Roitman H, Gal A, Raschid L.  2011.  A Dual Framework and Algorithms for Targeted Online Data Delivery. IEEE Transactions on Knowledge and Data Engineering. 23(1):5-21.
Mardziel P, Magill S, Hicks MW, Srivatsa M.  2011.  Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
An J-hoon(D), Chaudhuri A, Foster JS, Hicks MW.  2011.  Dynamic inference of static types for ruby. Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :459-472.
Chen D, Bilgic M, Getoor L, Jacobs DW.  2011.  Dynamic Processing Allocation in Video. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 33(11):2174-2187.
desJardins M, Sahami M, Wagstaff K.  2011.  EAAI-10: The First Symposium on Educational Advances in Artificial Intelligence. AI Magazine. 32(1):91-91.
Sahami M, desJardins M, Dodds Z, Neller T.  2011.  Educational advances in artificial intelligence. Proceedings of the 42nd ACM technical symposium on Computer science education. :81-82.
Hsiao HC, Studer A, Dubey R, Elaine Shi, Perrig A.  2011.  Efficient and secure threshold-based event validation for vanets.
Luo Y, Duraiswami R.  2011.  EFFICIENT PARALLEL NON-NEGATIVE LEAST SQUARES ON MULTI-CORE ARCHITECTURES. SIAM Journal on Scientific Computing. 33(5):2848-2863.
Huang Y, Malka L, Evans D, Katz J.  2011.  Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.
Huang Y, Shen C, Evans D, Katz J, Shelat A.  2011.  Efficient Secure Computation with Garbled Circuits. Information Systems Security. :28-48.
Brefeld U, Getoor L, Macskassy SA.  2011.  Eighth workshop on mining and learning with graphs. SIGKDD Explor. Newsl.. 12(2):63-65.
Hochheiser H, Shneiderman B.  2011.  Electronic medical records: usability challenges and opportunities. Interactions. 18(6):48-49.
Lam H, Bertini E, Isenberg P, Plaisant C, Carpendale S.  2011.  Empirical Studies in Information Visualization: Seven Scenarios. Visualization and Computer Graphics, IEEE Transactions on. PP(99):1-1.
Deshpande A, Khuller S, Malekian A, Toossi M.  2011.  Energy efficient monitoring in sensor networks. Algorithmica. 59(1):94-114.

Pages