Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Tahmoush D, Samet H.  2006.  Archimedes, an archive of medical images. American Medical Informatics Association 2006 Annual Symposium Proceedings Biomedical and Health Informatics: From Foundations to Applications to Policy, Washington, DC, DW Bates, JH Holmes, and G. Kuperman, editors.
Tahmoush D, Samet H.  2007.  An improved asymmetry measure to detect breast cancer. Proceedings of SPIE. 6514(1):65141Q-65141Q-9-65141Q-65141Q-9.
Tahmoush D, Samet H.  2006.  Image Similarity and Asymmetry to Improve Computer-Aided Detection of Breast Cancer. Digital Mammography. :221-228.
Taheri S, Turaga P, Chellappa R.  2011.  Towards view-invariant expression analysis using analytic shape manifolds. 2011 IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011). :306-313.
Tagamets MA, Reggia JA.  1989.  A data flow implementation of a competition-based connectionist model* 1. Journal of Parallel and Distributed Computing. 6(3):704-714.
Tagamets MA, Horwitz B, Reggia JA.  1995.  A large-scale neural model linking local neuronal dynamics to positron emission tomography (PET) regional cerebral blood ffow (rCBF) data. Soc Neurosci Abstr. 21:1988-1988.
Tabatabaee V, Tiwari A, Hollingsworth J.  2005.  Parallel Parameter Tuning for Applications with Performance Variability. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :57–-57–.
Tabatabaee V, Bhattacharjee B, La RJ, Shayman MA.  2005.  Differentiated traffic engineering for QoS provisioning. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. 4:2349-2359vol.4-2349-2359vol.4.
Tabatabaee V, Kashyap A, Bhattacharjee B, La RJ, Shayman MA.  2007.  Robust Routing with Unknown Traffic Matrices. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE. :2436-2440.
Tabatabaee V, Hollingsworth J.  2007.  Automatic software interference detection in parallel applications. Proceedings of the 2007 ACM/IEEE conference on Supercomputing. :14:1–14:12-14:1–14:12.
S
Sykes F, Tillman RT, Shneiderman B.  1983.  The effect of scope delimiters on program comprehension. Software: Practice and Experience. 13(9):817-824.
Swamy N, Hicks MW, Tsang S.  2007.  Verified Enforcement of Security Policies for Cross-Domain Information Flows. IEEE Military Communications Conference, 2007. MILCOM 2007. :1-7.
Swamy N, Hicks MW.  2008.  Verified enforcement of automaton-based information release policies. Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security. ACM Press.
Swamy N, Guts N, Leijen D, Hicks MW.  2011.  Lightweight monadic programming in ML. Proceedings of the 16th ACM SIGPLAN international conference on Functional programming. :15-27.
Swamy N, Hicks MW, Tse S, Zdancewic S.  2006.  Managing policy updates in security-typed languages. 19th IEEE Computer Security Foundations Workshop, 2006. :13pp.-216-13pp.-216.
Swamy N, Corcoran BJ, Hicks MW.  2008.  Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
Swamy N, Hicks MW, Morrisett G, Grossman D, Jim T.  2006.  Safe manual memory management in Cyclone. Science of Computer Programming. 62(2):122-144.
Swamy N, Hicks MW, Bierman GM.  2009.  A theory of typed coercions and its applications. Proceedings of the 14th ACM SIGPLAN international conference on Functional programming. :329-340.
Swamy N, Hicks MW.  2009.  Verified enforcement of stateful information release policies. SIGPLAN Not.. 43(12):21-31.
Swaminathan A, Wu M, Liu KJR.  2006.  Component Forensics of Digital Cameras: A Non-Intrusive Approach. Information Sciences and Systems, 2006 40th Annual Conference on. :1194-1199.
Swaminathan A, M. Wu, Liu KJR.  2006.  Image Tampering Identification using Blind Deconvolution. Image Processing, 2006 IEEE International Conference on. :2309-2312.
Swaminathan A, Mao Y, Wu M, Kailas K.  2005.  Data hiding in compiled program binaries for enhancing computer system performance. Information Hiding. :357-371.
Swaminathan A, M. Wu, Liu KJR.  2008.  Digital image forensics via intrinsic fingerprints. Information Forensics and Security, IEEE Transactions on. 3(1):101-117.
Swaminathan A, M. Wu, Liu KJR.  2009.  Component forensics. Signal Processing Magazine, IEEE. 26(2):38-48.
Swaminathan A, Mao Y, M. Wu.  2004.  Image hashing resilient to geometric and filtering operations. Multimedia Signal Processing, 2004 IEEE 6th Workshop on. :355-358.

Pages