Publications
Export 7151 results:
Author Title [ Type] Year Filters: Unreliable-convergence-criterion-arnoldi%E2%80%99s-method is [Clear All Filters]
1995. Transforming cabbage into turnip: polynomial algorithm for sorting signed permutations by reversals. Proceedings of the twenty-seventh annual ACM symposium on Theory of computing. :178-189.
1995. Transforming men into mice (polynomial algorithm for genomic distance problem). Foundations of Computer Science, Annual IEEE Symposium on. :581-581.
1993. Transitive closure: an experimental case study of three multithreaded database algorithms on a shared memory multiprocessor. Parallel and Distributed Information Systems, 1993., Proceedings of the Second International Conference on. :255-259.
1999. Transparent communication for distributed objects in Java. Proceedings of the ACM 1999 conference on Java Grande. :160-170.
2004. Transparent proxies for java futures. Proceedings of the 19th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. :206-223.
1991. Tree-maps: a space-filling approach to the visualization of hierarchical information structures. , IEEE Conference on Visualization, 1991. Visualization '91, Proceedings. :284-291.
2004. A tree-position kernel for document compression. Proceedings of the Fourth Document Understanding Conference (DUC 2004). :6-7.
2011. TreeVersity: Comparing tree structures by topology and node's attributes differences. 2011 IEEE Conference on Visual Analytics Science and Technology (VAST). :275-276.
2011. TreeVersity: Comparing tree structures by topology and node's attributes differences. Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on. :275-276.
2008. Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
2001. A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
2007. T-rex: A domain-independent system for automated cultural information extraction. Proceedings of the First International Conference on Computational Cultural Dynamics (ICCCD 2007).
2009. Triangle inequality variations in the internet. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :177-183.
1999. Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
2011. A trust model for supply chain management. The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3. :1375-1376.
2006. Trusted declassification:: high-level policy for a security-typed language. Proceedings of the 2006 workshop on Programming languages and analysis for security. :65-74.
2004. Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
1996. Tuning the performance of I/O-intensive parallel applications. Proceedings of the fourth workshop on I/O in parallel and distributed systems: part of the federated computing research conference. :15-27.
2006. The turbulence structure of shockwave and boundary layer interaction in a compression corner. 44th AIAA Aerospace Meeting and Exhibit. 2006
2005. Turning information visualization innovations into commercial products: lessons to guide the next success. IEEE Symposium on Information Visualization, 2005. INFOVIS 2005. :241-244.
2009. TwitterStand: news in tweets. Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. :42-51.