Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2007
Hicks MW.  2007.  Analyzing information flow. Conference on Programming Language Design and Implementation: Proceedings of the 2007 workshop on Programming languages and analysis for security.
Demner-Fushman D, Jimmy Lin.  2007.  Answering Clinical Questions with Knowledge-Based and Statistical Techniques. Computational Linguistics. 33(1):63-103.
Zhou SK, Aggarwal G, Chellappa R, Jacobs DW.  2007.  Appearance Characterization of Linear Lambertian Objects, Generalized Photometric Stereo, and Illumination-Invariant Face Recognition. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 29(2):230-245.
Srivastava S, Hicks MW, Foster JS.  2007.  Appendix to CMod: Modular Information Hiding and Type-Safe Linking for C. Technical Reports of the Computer Science Department.
Josyula DP, Fults S, Anderson ML, Wilson S, Perlis D.  2007.  Application of MCL in a dialog agent. Third Language and Technology Conference.
Katz J, Yung M.  2007.  Applied cryptography and network security: 5th international conference, ACNS 2007, Zhuhai, China, June 5-8, 2007: proceedings. 4521
Condon E, Cukier M, He T.  2007.  Applying Software Reliability Models on Security Incidents. :159-168.
Srinivasan A.  2007.  Approximation algorithms for stochastic and risk-averse optimization. Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms. :1305-1313.
Rosenfeld SN, Rus I, Cukier M.  2007.  Archetypal behavior in computer security. Journal of Systems and Software. 80(10):1594-1606.
Grube NE, Taylor EM, Martin, M.P.  2007.  Assessment of WENO methods with shock-confining filtering for LES of compressible turbulence. AIAA Paper 2007. 4198
Rawlings TK, Ruiz GM, Colwell RR.  2007.  Association of Vibrio Cholerae O1 El Tor and O139 Bengal with the Copepods Acartia Tonsa and Eurytemora Affinis. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 73(24):7926-7933.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Brooks PA, Memon AM.  2007.  Automated gui testing guided by usage profiles. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :333-342.
Zhu G, Doermann D.  2007.  Automatic Document Logo Detection. The 9th International Conference on Document Analysis and Recognition (ICDAR 2007). :864-868.
Tabatabaee V, Hollingsworth J.  2007.  Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
Brabec F, Samet H.  2007.  Autonomic computing. IEEE internet computing. 11(1):52-59.
Lee S, Levin D, Gopalakrishnan V, Bhattacharjee B.  2007.  Backbone construction in selfish wireless networks. Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :121-132.
Froehlich J, Wobbrock JO, Kane SK.  2007.  Barrier pointing: using physical edges to assist target acquisition on mobile device touch screens. Proceedings of the 9th international ACM SIGACCESS conference on Computers and accessibility, October. :15-17.
Daumé H, Campbell L.  2007.  A Bayesian model for discovering typological implications. ANNUAL MEETING-ASSOCIATION FOR COMPUTATIONAL LINGUISTICS. 45:65-65.
Bertini E, Plaisant C, Santucci G.  2007.  BELIV'06: beyond time and errors: novel evaluation methods for information visualization. interactions. 14(3):59-60.
Ji H, Fermüller C.  2007.  Better flow estimation from color images. EURASIP Journal on Advances in Signal Processing. 2007(1):133-133.
Ko MY, Murthy PK, Bhattacharyya SS.  2007.  Beyond single-appearance schedules: Efficient DSP software synthesis using nested procedure calls. ACM Transactions on Embedded Computing Systems (TECS). 6(2):14–es-14–es.
Grand J, Cummings MP, Rebelo TG, Ricketts TH, Neel MC.  2007.  Biased data reduce efficiency and effectiveness of conservation reserve networks. Ecology Letters. 10(5):364-374.
Yahav I, Raschid L, Andrade H.  2007.  Bid based scheduler with backfilling for a multiprocessor system. Proceedings of the ninth international conference on Electronic commerce. :459-468.
Shet VD, Neumann J, Ramesh V, Davis LS.  2007.  Bilattice-based Logical Reasoning for Human Detection. Computer Vision and Pattern Recognition, 2007. CVPR '07. IEEE Conference on. :1-8.

Pages