Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Conference Papers
Shet VD, Harwood D, Davis LS.  2006.  Top-down, bottom-up multivalued default reasoning for identity maintenance. Proceedings of the 4th ACM international workshop on Video surveillance and sensor networks. :79-86.
Doermann D, Mihalcik D.  2000.  Tools and Techniques for Video Performances Evaluation. ICPR. 4:167-170.
JaJa JF, Smorul M, Song S.  2009.  Tools and Services for Long-Term Preservation of Digital Archives. Indo-US Workshop on International Trends in Digital Preservation.
Keceli F, Tzannes A, Caragea GC, Barua R, Vishkin U.  2011.  Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1282-1291.
Zazworka N, Basili VR, Shull F.  2009.  Tool supported detection and judgment of nonconformance in process execution. Empirical Software Engineering and Measurement, 2009. ESEM 2009. 3rd International Symposium on. :312-323.
Chen C, Porter A, Purtilo J.  1994.  Tool support for tailored software prototyping. Assessment of Quality Software Development Tools, 1994, Proceedings., Third Symposium on. :171-181.
Dumitras T, Narasimhan P, Tilevich E.  2010.  To Upgrade or Not to Upgrade: Impact of Online Upgrades Across Multiple Administrative Domains. OOPSLA'10 Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications. :865-876.
Zheleva E, Getoor L.  2009.  To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. Proceedings of the 18th international conference on World wide web. :531-540.
Hannenhalli S, Pevzner P.  1996.  To cut… or not to cut (applications of comparative physical maps in molecular evolution). Proceedings of the seventh annual ACM-SIAM symposium on Discrete algorithms. :304-313.
Bongki CC, Chang C, Moon B, Acharya A, Shock C, Sussman A, Saltz J.  1997.  Titan: a High-Performance Remote-sensing Database. In Proceedings of the 1997 International Conference on Data Engineering.
Anderson ML, Josyula DP, Okamoto YA, Perlis D.  2002.  Time-situated agency: Active logic and intention formation. in: Workshop on Cognitive Agents, 25th German Conference on Artificial Intelligence.
Coolahan Jr JE, Roussopoulos N.  1985.  A timed petri net methodolgoy for specifying real-time system timing requirements. International Workshop on Timed Petri Nets. :24-31.
Zhuolin Jiang, Li S-F, Gao D-F.  2006.  A Time Saving Method for Human Detection in Wide Angle Camera Images. Machine Learning and Cybernetics, 2006 International Conference on. :4029-4034.
Aryangat S, Andrade H, Sussman A.  2004.  Time and space optimization for processing groups of multi-dimensional scientific queries. Proceedings of the 18th annual international conference on Supercomputing. :95-105.
Arya S, Mount D, Xia J.  2010.  Tight lower bounds for halfspace range searching. Proceedings of the 2010 annual symposium on Computational geometry. :29-37.
Alon N, Azar Y, Vishkin U.  1986.  Tight complexity bounds for parallel comparison sorting. 27th Annual Symposium on Foundations of Computer Science. :502-510.
Karlson AK, Bederson BB.  2007.  Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
Mundur P, Sood A, Simon R.  1998.  Threshold-based admission control for multi-class video-on-demand systems. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :154-160.
Kundu K, Sessions C, desJardins M, Rheingans P.  2002.  Three-dimensional visualization of hierarchical task network plans. In Proceedings of the 3rd International NASA Workshop on Planning and Scheduling for.
Seydou F, Duraiswami R, Seppanen T.  2003.  Three dimensional acoustic scattering from an M multilayered domain via an integral equation approach. Antennas and Propagation Society International Symposium, 2003. IEEE. 1:669-672vol.1-669-672vol.1.
Zelkowitz MV.  1975.  Third generation compiler design. Proceedings of the 1975 annual conference. :253-258.
Piatetsky-Shapiro G, Grossman R, Djeraba C, Feldman R, Getoor L, Zaki M.  2006.  Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
Lathan C, Vice J M, Tracey M, Plaisant C, Druin A, Edward K, Montemayor J.  2001.  Therapeutic play with a storytelling robot. CHI '01 extended abstracts on Human factors in computing systems. :27-28.
Swamy N, Hicks MW, Bierman GM.  2009.  A theory of typed coercions and its applications. Proceedings of the 14th ACM SIGPLAN international conference on Functional programming. :329-340.
Foster JS, Fähndrich M, Aiken A.  1999.  A theory of type qualifiers. ACM SIGPLAN Notices. 34:192-203.

Pages