Publications

Export 7151 results:
Author Title Type [ Year(Desc)]
2009
Ran Y, Zheng Q, Chellappa R.  2009.  Detecting humans carrying objects. SPIE Newsroom.
Bin Tariq M, Motiwala M, Feamster N, Ammar M.  2009.  Detecting network neutrality violations with causal inference. Proceedings of the 5th international conference on Emerging networking experiments and technologies. :289-300.
Hao S, Syed N A, Feamster N, Gray AG, Krasser S.  2009.  Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. Proceedings of the 18th conference on USENIX security symposium. :101-118.
Grim CJ, Jaiani E, Whitehouse CA, Janelidze N, Kokashvili T, Tediashvili M, Colwell RR, Huq A.  2009.  Detection of toxigenic Vibrio cholerae O1 in freshwater lakes of the former Soviet Republic of Georgia. Environmental Microbiology Reports. 2(1):2-6.
Mohapatra SS, Ramachandran D, Mantri CK, Colwell RR, Singh DV.  2009.  Determination of relationships among non-toxigenic Vibrio cholerae O1 biotype El Tor strains from housekeeping gene sequences and ribotype patterns. Research in Microbiology. 160(1):57-62.
Medem A, Teixeira R, Feamster N, Meulle M.  2009.  Determining the causes of intradomain routing changes.
Weiss K, De Floriani L.  2009.  Diamond Hierarchies of Arbitrary Dimension. Computer Graphics Forum. 28(5):1289-1300.
Delp E, Memon N, Wu M.  2009.  Digital forensics [From the Guest Editors]. Signal Processing Magazine, IEEE. 26(2):14-15.
De Floriani L, Magillo P, Puppo E.  2009.  A dimension-independent library for building and manipulating multiresolution triangulations. DISI-TR-99-03
Khoo Y P, Hicks MW, Foster JS, Sazawal V.  2009.  Directing JavaScript with arrows. Proceedings of the 5th symposium on Dynamic languages. :49-58.
Mesmoudi M, De Floriani L, Magillo P.  2009.  Discrete distortion for surface meshes. Image Analysis and Processing–ICIAP 2009. :652-661.
Sankaranarayanan J, Samet H.  2009.  Distance Oracles for Spatial Networks. Data Engineering, 2009. ICDE '09. IEEE 25th International Conference on. :652-663.
Barash V, Smith M, Getoor L, Welser HT.  2009.  Distinguishing knowledge vs social capital in social media with roles and context. Proceedings of the ICWSM. 9
Rodríguez A, Reggia JA.  2009.  A distributed learning algorithm for particle systems. Integrated Computer-Aided Engineering. 16(1):1-20.
Han B, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2009.  Distributed Strategies for Channel Allocation and Scheduling in Software-Defined Radio Networks. IEEE INFOCOM 2009. :1521-1529.
Zo Y-G, Chokesajjawatee N, Grim C, Arakawa E, Watanabe H, Colwell RR.  2009.  Diversity and Seasonality of Bioluminescent Vibrio Cholerae Populations in Chesapeake Bay. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 75(1):135-146.
Hansen DL, Rotman D, Bonsignore E, Milic-Frayling N, Rodrigues EM, Smith M, Shneiderman B.  2009.  Do you know the way to SNA?: A process model for analyzing and visualizing social media data University of Maryland Tech Report: HCIL-2009-17.
Erway C, Küp\ccü A, Papamanthou C, Tamassia R.  2009.  Dynamic Provable Data Possession. CCS '09 Proceedings of the 16th ACM Conference on Computer and Communications Security . :213-222.
Subramanian S, Hicks MW, McKinley KS.  2009.  Dynamic software updates: a VM-centric approach. Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation. :1-12.
Subramanian S, Hicks MW, McKinley KS.  2009.  Dynamic software updates for Java: A VM-centric approach. Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI).
Sharara H, Singh L, Getoor L, Mann J.  2009.  The Dynamics of Actor Loyalty to Groups in Affiliation Networks. Social Network Analysis and Mining, 2009. ASONAM '09. International Conference on Advances in. :101-106.
Konte M, Feamster N, Jung J.  2009.  Dynamics of online scam hosting infrastructure. Passive and Active Network Measurement. :219-228.
Kanagal B, Deshpande A.  2009.  Ef?cient Query Evaluation over Temporally Correlated Probabilistic Streams IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :1315-1318.
Arya S, Malamatos T, Mount D.  2009.  The effect of corners on the complexity of approximate range searching. Discrete & Computational Geometry. 41(3):398-443.
Katz J, Ostrovsky R, Yung M.  2009.  Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.

Pages