Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
Kules B, Kang H, Plaisant C, Rose A, Shneiderman B.  2004.  Immediate usability: a case study of public access design for a community photo library. Interacting with Computers. 16(6):1171-1193.
Kules B, Kang H, Plaisant C, Rose A, Shneiderman B.  2005.  Immediate Usability: A Case Study of Public Access Design for a Community Photo Library (2003). Institute for Systems Research Technical Reports.
Kules B, Kang H, Plaisant C, Rose A, Shneiderman B.  2005.  Immediate Usability: Kiosk design principles from the CHI 2001 Photo Library (2001). Institute for Systems Research Technical Reports.
Kules B, Kang H, Plaisant C, Rose A, Shneiderman B.  2003.  Immediate Usability: Kiosk design principles from the CHI 2001 Photo Library. Technical Reports from UMIACS.
Mundur P, Seligman M, Lee J N.  2008.  Immunity-Based Epidemic Routing in Intermittent Networks. 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2008. SECON '08. :609-611.
Pfeiffer S, Fushman D, Cowburn D.  1999.  Impact of Cl− and Na+ ions on simulated structure and dynamics of βARK1 PH domain. Proteins: Structure, Function, and Bioinformatics. 35(2):206-217.
Dix J, Muñoz-Avila H, Nau DS, Zhang L.  2003.  IMPACTing SHOP: Putting an AI Planner Into a Multi-Agent Environment. Annals of Mathematics and Artificial Intelligence. 37(4):381-407.
Zelkowitz MV, Wallace DR, Binkley DW.  2002.  Impediments to software engineering technology transfer. Journal of Systems and Software. Forthcoming.
Zelkowitz MV, Larsen HJ.  1978.  Implementation of a Capability-Based Data Abstraction. Software Engineering, IEEE Transactions on. SE-4(1):56-64.
Jallad K, Katz J, Schneier B.  2002.  Implementation of chosen-ciphertext attacks against PGP and GnuPG. Information Security. :90-101.
Zelkowitz MV, Lyle JR.  1981.  Implementation of language enhancements. Computer Languages. 6(3–4):139-153.
Vishkin U.  1983.  Implementation of simultaneous memory address access in models that forbid it. Journal of algorithms. 4(1):45-50.
Smorul M, Song S, JaJa JF.  2009.  An Implementation of the Audit Control Environment (ACE) to Support the Long Term Integrity of Digital Archives. Proceedings of DigCCurr2009 Digital Curation: Practice, Promise and Prospects. :164-164.
Mastronardi N, Lemmerling P, Kalsi A, O’Leary DP, Huffel VS.  2004.  Implementation of the regularized structured total least squares algorithms for blind image deblurring. Linear Algebra and its Applications. 391:203-221.
Eckman BA, Gaasterland T, Lacroix Z, Raschid L, Snyder B, Vidal ME.  2006.  Implementing a bioinformatics pipeline (bip) on a mediator platform: Comparing cost and quality of alternate choices. Data Engineering Workshops, 2006. Proceedings. 22nd International Conference on. :67-67.
Wolski R, Spring N, Peterson C.  1997.  Implementing a performance forecasting system for metacomputing: the Network Weather Service. Proceedings of the 1997 ACM/IEEE conference on Supercomputing (CDROM). :1-19.
Bederson BB, Meyer J.  1998.  Implementing a zooming User Interface: experience building Pad++. Software: Practice and Experience. 28(10):1101-1135.
Stewart G.W.  1998.  Implementing an Algorithm for Solving Block Hessenberg Systems. UMIACS-TR-94-70
Jung J H, O'Leary DP.  2008.  Implementing an Interior Point Method for Linear Programs on a CPU-GPU System. Electronic Transactions on Numerical Analysis. 28:174-189.
Hussein M, Varshney A, Davis LS.  2007.  On implementing graph cuts on cuda. First Workshop on General Purpose Processing on Graphics Processing Units.
Gebremichael M, Hicks MW.  2003.  Implementing On-line Software Upgrades in Java.
Bell C, Nerode A, Ng RT, V.S. Subrahmanian.  2004.  Implementing stable semantics by linear programming. Logic Programming and Non-Monotonic Reasoning, Proceedings of the Second International Workshop. 7:23-42.
Basili VR, Lindvall M, Costa P.  2001.  Implementing the Experience Factory concepts as a set of Experience Bases. Proc. 13th Int’l Conf. Software Eng. and Knowledge Eng. :102-109.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Feamster N, Johari R, Balakrishnan H.  2005.  Implications of autonomy for the expressiveness of policy routing. Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. :25-36.

Pages