Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Journal Articles
Vishkin U.  1996.  Can parallel algorithms enhance serial implementation? Communications of the ACM. 39(9):88-91.
Ramachandran A, Dagon D, Feamster N.  2006.  Can DNS-based blacklists keep up with bots. Conference on email and anti-spam.
Cho S, Zwick A, Regier JC, Mitter C, Cummings MP, Yao J, Du Z, Zhao H, Kawahara AY, Weller S et al..  2011.  Can Deliberately Incomplete Gene Sample Augmentation Improve a Phylogeny Estimate for the Advanced Moths and Butterflies (Hexapoda: Lepidoptera)? Systematic BiologySyst Biol. 60(6):782-796.
Liang J, Doermann D, Li H.  2005.  Camera-Based Analysis of Text and Documents: ASurvey. International Journal on Document Analysis and Recognition. 7(2+3):83-104.
McMaster S, Memon AM.  2008.  Call-Stack Coverage for GUI Test Suite Reduction. Software Engineering, IEEE Transactions on. 34(1):99-115.
Chockler G, Dekel E, JaJa JF, Jimmy Lin.  2009.  Call for Papers: Special Issue of the Journal of Parallel and Distributed Computing: Cloud Computing. J. Parallel Distrib. Comput.. 69(9):813–-813–.
Wilkins DE, desJardins M.  2001.  A Call for Knowledge-Based Planning. AI Magazine. 22(1):99-99.
Hicks MW, Weirich S.  2001.  A Calculus for Dynamic Loading. Technical Reports (CIS).
Burke ER, Gomez RD, Madabhushi R, Mayergoyz ID.  1994.  Calculation of head sensitivity function from 3-D magnetic fields. Magnetics, IEEE Transactions on. 30(6):4278-4280.
Ellis J, Tran C, Ryoo J, Shneiderman B.  1998.  Buttons vs. menus: An exploratory study of pull-down menu selection as compared to button bars. Technical Reports of the Computer Science Department.
Shneiderman B, Lewis C.  1993.  Building Partnerships and Infrastructure. Communications of the ACM. 32(1):9-23.
Gupta SK, Kramer TR, Nau DS, Regli WC, Zhang G.  1994.  Building MRSEV models for CAM applications. Advances in Engineering Software. 20(2–3):121-139.
Hourcade JP, Bederson BB, Druin A.  2004.  Building KidPad: an application for children's collaborative storytelling. Software: Practice and Experience. 34(9):895-914.
Bartholomew JC, Pearson AD, Stenseth NC, LeDuc JW, Hirschberg DL, Colwell RR.  2015.  Building Infectious Disease Research Programs to Promote Security and Enhance Collaborations with Countries of the Former Soviet Union. Frontiers in Public Health. 35361632
Shneiderman B, LEWIS CLAYTON.  1993.  Building HCI partnerships and infrastructure. Behaviour & Information Technology. 12(2):130-135.
Sussman A.  2006.  Building complex coupled physical simulations on the grid with InterComm. Engineering with Computers. 22(3):311-323.
Tanin E, Harwood A, Samet H, Nayar D, Nutanong S.  2006.  Building and querying a P2P virtual world. Geoinformatica. 10(1):91-116.
Basili VR, Tesoriero R, Costa P, Lindvall M, Rus I, Shull F, Zelkowitz MV.  2001.  Building an Experience Base for Software Engineering: A report on the first CeBASE eWorkshop. Product Focused Software Process Improvement. :110-125.
Dorr BJ, Palmer M.  1995.  Building a LCS-Based Lexicon in TAGs. Proceedings of the AAAI-95 Spring Symposium Series, Representation and Acquisition of Lexical Knowledge: Polysemy, Ambiguity, and Generativity, Stanford, CA, March. :27-29.
Anwer M B, Feamster N.  2010.  Building a fast, virtualized data plane with programmable hardware. SIGCOMM Comput. Commun. Rev.. 40(1):75-82.
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a dynamic reputation system for DNS. 19th Usenix Security Symposium.
Seo J, Bakay M, Chen Y-W, Hilmer S, Shneiderman B, Hoffman EP.  2005.  Building a Coherent Data Pipeline in Microarray Data Analyses: Optimization of Signal/Noise Ratios Using an Interactive Visualization Tool and a Novel Noise Filtering Method (2003). Institute for Systems Research Technical Reports.
Murthy PK, Bhattacharyya SS.  2004.  Buffer merging—a powerful technique for reducing memory requirements of synchronous dataflow specifications. ACM Transactions on Design Automation of Electronic Systems (TODAES). 9(2):212-237.
Khuller S, Moss A, Naor JS.  1999.  The budgeted maximum coverage problem. Information Processing Letters. 70(1):39-45.
Liao H, Osada M, Shneiderman B.  1998.  Browsing Unix Directories With Dynamic Queries: An Evaluation of Three Information Display Techniques. Technical Reports of the Computer Science Department.

Pages