Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Journal Articles
Chang CF, Varshney A, Ge QJ.  2001.  Haptic and aural rendering of a virtual milling process. ASME 2001 Design Engineering Technical Conference and Computers and Information in Engineering Conference, Pittsburgh, PA. :105-113.
M. Wu, Fridrich J, Goljan M, Gou H.  2005.  Handling uneven embedding capacity in binary images: a revisit. Proceedings of SPIE. 5681(1):194-205.
Katz J, Lindell Y.  2008.  Handling expected polynomial-time strategies in simulation-based security proofs. Journal of Cryptology. 21(3):303-349.
Feamster N, Borkenhagen J, Rexford J.  2003.  Guidelines for interdomain traffic engineering. SIGCOMM Comput. Commun. Rev.. 33(5):19-30.
Memon AM.  2002.  GUI testing: Pitfalls and process. IEEE Computer. 35(8):87-88.
Memon AM, Banerjee I, Nagarajan A.  2003.  GUI ripping: Reverse engineering of graphical user interfaces for testing. Proceedings of the 10th working conference on reverse engineering (WCRE’03). 1095(1350/03):17-00.
Yuan X, Cohen MB, Memon AM.  2011.  GUI Interaction Testing: Incorporating Event Context. Software Engineering, IEEE Transactions on. 37(4):559-574.
Figueiredo MAT, Hancock ER, Pelillo M, Zerubia J.  2003.  Guest editors' Introduction to the special section on energy minimization methods in computer vision and pattern recognition. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 25(11):1361-1363.
Giancarlo R, Hannenhalli S.  2008.  Guest Editors' Introduction to the Special Section on Algorithms in Bioinformatics. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 5(4):482-483.
Varshney A.  2001.  Guest Editor's Introduction: Special Issue on Visualization 2000. IEEE Transactions on Visualization and Computer Graphics. 7(3):193-194.
Khanna S, Srinivasan A.  2004.  Guest editors' foreword: special issue: 35th annual ACM symposium on theory of computing. Journal of Computer and System Sciences. 69(3):305-305.
Bhanu B, Ratha NK, Kumar V, Chellappa R, Bigun J.  2007.  Guest Editorial: Special Issue on Human Detection and Recognition. Information Forensics and Security, IEEE Transactions on. 2(3):489-490.
Wang JZ, M. Wu, Trappe W, Liu KJR.  2004.  Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process.. 2004:2153-2173.
Jacobs DW.  1989.  Grouping for recognition. AI Memos (1959 - 2004).
Kantere V, Tsoumakos D, Sellis T, Roussopoulos N.  2009.  GrouPeer: Dynamic clustering of P2P databases. Information Systems. 34(1):62-86.
He S, Wu M.  2005.  Group-based joint coding and embedding technique for multimedia fingerprinting. Proc. SPIE. 5681:96-105.
Gordon S, Katz J, Vaikuntanathan V.  2010.  A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010. :395-412.
Saha B, Getoor L.  2008.  Group proximity measure for recommending groups in online social networks. networks. 1(6):5-5.
Perlis D.  1976.  Group algebras and model theory. Illinois journal of mathematics. 20(2):298-305.
Jacobs DW.  1987.  GROPER: A Grouping Based Object Recognition System for Two-Dimensional Objects. IEEE Workshop on Computer Vision. :164-169.
Bazinet AL, Myers DS, Fuetsch J, Cummings MP.  2007.  Grid Services Base Library: A high-level, procedural application programming interface for writing Globus-based Grid services. Future Generation Comp Syst. 23(3):517-522.
Cummings MP, Huskamp JC.  2005.  Grid computing. EDUCAUSE Review. 40:116-117.
Arlt S, Banerjee I, Bertolini C, Memon AM, Schäf M.  2012.  Grey-box GUI Testing: Efficient Generation of Event Sequences. arXiv:1205.4928.
Weiland WJ, Shneiderman B.  1993.  A graphical query interface based on aggregation/generalization hierarchies. Information Systems. 18(4):215-232.
Deshpande A, Getoor L, Sen P.  2009.  Graphical models for uncertain data. Managing and Mining Uncertain Data. :77-77.

Pages