Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Reggia JA, Nau DS, Wang PY, Peng Y.  1985.  A formal model of diagnostic inference, II. Algorithmic solution and application. Information Sciences. 37(1-3):257-285.
Ray A, Cleaveland R.  2004.  Formal Modeling Of Middleware-based Distributed Systems. Electronic Notes in Theoretical Computer Science. 108:21-37.
Tian J, Zelkowitz MV.  1992.  A formal program complexity model and its application. Journal of Systems and Software. 17(3):253-266.
Weissman A, Gupta SK, Fiorentini X, Sudarsan R, Sriram R.  2009.  Formal Representation of Product Design Specifications for Validating Product Design. :1411-1422.
Ramasamy HV, Cukier M, Sanders WH.  2002.  Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
Ramasamy HV, Cukier M, Sanders WH.  2003.  Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
Bierman G, Hicks MW, Sewell P, Stoyle G.  2003.  Formalizing dynamic software updating. Proceedings of the Second International Workshop on Unanticipated Software Evolution (USE).
Pratikakis P, Foster JS, Hicks MW, Neamtiu I.  2008.  Formalizing Soundness of Contextual Effects. Theorem Proving in Higher Order LogicsTheorem Proving in Higher Order Logics. 5170:262-277.
Liao HS, Osada M, Shneiderman B.  1992.  A formative evaluation of three interfaces for browsing directories using dynamic queries.
Minker J.  2007.  Forming a Computer Science Center at the University of Maryland. IEEE Annals of the History of Computing. 29(1):49-64.
Stewart G.W.  2003.  A Fortran 95 Matrix Wrapper. UMIACS-TR-2003-89
Kreitzberg CB, Shneiderman B.  1990.  FORTRAN Programming: A Spiral Approach.
Katz J, Ostrovsky R, Yung M.  2003.  Forward secrecy in password-only key exchange protocols. Proceedings of the 3rd international conference on Security in communication networks. :29-44.
Kuter U, Nau DS.  2004.  Forward-chaining planning in nondeterministic domains. :513-518.
Canetti R, Halevi S, Katz J.  2007.  A forward-secure public-key encryption scheme. Journal of Cryptology. 20(3):265-294.
Katz J.  2002.  A forward-secure public-key encryption scheme.
Canetti R, Halevi S, Katz J.  2003.  A forward-secure public-key encryption scheme. Advances in Cryptology—Eurocrypt 2003. :646-646.
Shaman J., Solomon S., Colwell RR, Field C.B.  2013.  Fostering advances in interdisciplinary climate science. Proceedings of the National Academy of Sciences. (Supplement_114869243Supplement_1):3653-3656.
Agrawala AK, Rauscher TG.  1976.  Foundations of microprogramming: architecture, software, and applications.
Samet H.  2006.  Foundations of Multidimensional And Metric Data Structures.
Samet H.  2006.  Foundations of Multidimensional And Metric Data Structures. :1023.
Stewart G.W.  1998.  Four algorithms for the efficient computation of truncated pivoted QR approximation to a sparse matrix. TR-98-12
Stewart G.W.  1999.  Four algorithms for the efficient computation of truncated pivoted QR approximations to a sparse matrix. Numerische Mathematik. 83(2):313-323.
Chan TF, Elman H.  1989.  Fourier Analysis of Iterative Methods for Elliptic Problems. SIAM Review. 31(1):20-49.
Elman H, Ramage A.  2006.  Fourier analysis of multigrid for a model two-dimensional convection-diffusion equation. BIT Numerical Mathematics. 46(2):283-306.

Pages