Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Svec P, Gupta SK.  2012.  Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
Arbaugh WA, Keromytis AD, Farber DJ, Smith JM.  1998.  Automated recovery in a secure bootstrap process. Proceedings of the Symposium on Network and Distributed Systems Security (NDSS’98). :155-167.
Alva U, Gupta SK.  1999.  Automated punch shape synthesis for sheet metal bending operations.
Ghallab M, Nau DS, Traverso P.  2004.  Automated Planning: Theory and Practice.
Svec P, Gupta SK.  2011.  Automated Planning Logic Synthesis for Autonomous Unmanned Vehicles in Competitive Environments with Deceptive Adversaries. New Horizons in Evolutionary Robotics. 341:171-193.
Gupta SK.  1995.  Automated Manufacturability Analysis of Machined Parts.
Gupta SK, Regli WC, Das D, Nau DS.  1997.  Automated manufacturability analysis: A survey. Research in Engineering Design. 9(3):168-190.
Das D, Gupta SK, Regli WC, Nau DS.  1995.  Automated Manufacturability Analysis: A Survey. ISR; TR 1995-14
Miller M, Perlis D.  1996.  Automated inference in active logics. JOURNAL OF APPLIED NONCLASSICAL LOGICS. 6:9-28.
Brooks PA, Memon AM.  2007.  Automated gui testing guided by usage profiles. Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering. :333-342.
Memon AM.  2004.  Automated GUI regression testing using AI planning. Artificial Intelligence Methods in Software TestingArtificial Intelligence Methods in Software Testing. :51-99.
Gu R, Piat J, Raulet M, Janneck JW, Bhattacharyya SS.  2010.  Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP). :265-272.
Petroni, Jr. NL, Hicks MW.  2007.  Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
Alva U, Gupta SK.  2001.  Automated design of sheet metal punches for bending multiple parts in a single setup. Robotics and Computer-Integrated Manufacturing. 17(1–2):33-47.
Alva U, Gupta SK, Gupta RK.  2000.  Automated design of sheet metal bending tools.
Kumar M, Gupta SK.  2002.  Automated design of multi-stage molds for manufacturing multi-material objects. Journal of Mechanical Design. 124:399-399.
Grushin A, Reggia JA.  2008.  Automated design of distributed control rules for the self-assembly of prespecified artificial structures. Robotics and Autonomous Systems. 56(4):334-359.
Chung I-H, Hollingsworth J.  2004.  Automated cluster-based Web service performance tuning. 13th IEEE International Symposium on High performance Distributed Computing, 2004. Proceedings. :36-44.
Tamizi M, Weinstein M, Cukier M.  2005.  Automated checking for Windows host vulnerabilities. :10pp.-148-10pp.-148.
Perlis D.  1988.  Autocircumscription. Artificial Intelligence. 36(2):223-236.
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Elaine Shi, Song Z.  2010.  Authentication in the clouds: a framework and its application to mobile users. :1-6.
Ramachandran AV, Feamster N.  2008.  Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
Papamanthou C, Tamassia R, Triandopoulos N.  2008.  Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
Gordon S, Katz J, Kumaresan R, Yerukhimovich A.  2010.  Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems. :144-158.
Lieberman MD, Sankaranarayanan J, Samet H, Sperling J.  2008.  Augmenting spatio-textual search with an infectious disease ontology. Data Engineering Workshop, 2008. ICDEW 2008. IEEE 24th International Conference on. :266-269.

Pages