Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Helman DR, JaJa JF, Bader DA.  1998.  A new deterministic parallel sorting algorithm with an experimental evaluation. Journal of Experimental Algorithmics (JEA). 3
Helman D, JaJa JF.  1995.  Efficient image processing algorithms on the scan line array processor. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 17(1):47-56.
Helman DR, Bader DA, JaJa JF.  1998.  A Parallel Sorting Algorithm With an Experimental Study. UMIACS-TR-95-102
Helman DR, Bader DA, JaJa JF.  1996.  Parallel algorithms for personalized communication and sorting with an experimental study (extended abstract). Proceedings of the eighth annual ACM symposium on Parallel algorithms and architectures. :211-222.
Helman DR, JaJa JF.  1999.  Prefix computations on symmetric multiprocessors. Parallel and Distributed Processing, 1999. 13th International and 10th Symposium on Parallel and Distributed Processing, 1999. 1999 IPPS/SPDP. Proceedings. :7-13.
Hemaraj Y, Sen M, Shekhar R, Bhattacharyya SS.  2006.  Model-based mapping of image registration applications onto configurable hardware. Signals, Systems and Computers, 2006. ACSSC'06. Fortieth Asilomar Conference on. :1453-1457.
Hendler J, Nau DS, Parsia B, Sirin E, Wu D.  2006.  Automatic web services composition using Shop2.
Hennacy K, Swamy N, Perlis D.  2003.  RGL study in a hybrid real-time system. Proceedings of the IASTED NCI.
Hermjakob U, Knight K, Daumé H.  2008.  Name translation in statistical machine translation: Learning when to transliterate. Proceedings of ACL-08: HLT. :389-397.
Herrmann JW, Cooper J, Gupta SK, Hayes CC, Ishii K, Kazmer D, Sandborn PA, Wood WH.  2004.  New directions in design for manufacturing. :1-9.
Hert CA, Liddy ED, Shneiderman B, Marchionini G.  2003.  Supporting statistical electronic table usage by citizens. Commun. ACM. 46(1):52-54.
Herve J-Y, Aloimonos Y.  1992.  Exploratory active vision: theory. Proceedings of 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1992. :10-15.
Herve J, Aloimonos Y.  1990.  Catastrophe theory and computational vision. Proc. AAAI-90 Workshop on Qualitative Vision. :96-100.
Hesse BW, Shneiderman B.  2007.  eHealth Research from the User’s Perspective. American Journal of Preventive Medicine. 32(5, Supplement):S97-S103-S97-S103.
Hettinger AZ, Rackoff A, Wongsuphasawat K, Cheng H, Fairbanks RJ, Plaisant C, Smith MS.  2011.  Improved Identification and Visualization of Emergency Department Patient Visits. Annals of Emergency Medicine. 58(4):S309-S309.
Heyman DP, O'Leary DP.  1995.  What is Fundamental for Markov Chains: First Passage Times, Fundamental Matrices, and Group Generalized Inverses. Proceedings of the Second International Workshop on Markov ChainsProceedings of the Second International Workshop on Markov Chains. :151-161.
Heyman DP, O'Leary DP.  1998.  Overcoming Instability In Computing The Fundamental Matrix For A Markov Chain. SIAM Journal on Matrix Analysis and Applications. 19(2):534-540.
Hicks MW, Nettles S, Seong-Kyu S, Shannon S.  2011.  Evolution in Action: Using Active Networking to Evolve Network Support for Mobility. IFIP Lecture Notes in Computer Science (LNCS). 2546(2546):146-161.
Hicks MW, Moore J, Nettles S.  2001.  Compiling PLAN to SNAP. Active NetworksActive Networks. 2207:134-151.
Hicks MW, Morrisett G, Grossman D, Jim T.  2003.  Safe and flexible memory management in Cyclone. Technical Reports from UMIACS.
Hicks MW, Keromytis AD, Smith JM.  2003.  A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
Hicks B, King D, McDaniel P, Hicks MW.  2006.  Trusted declassification:: high-level policy for a security-typed language. Proceedings of the 2006 workshop on Programming languages and analysis for security. :65-74.
Hicks MW, Nettles S.  2005.  Dynamic software updating. ACM Trans. Program. Lang. Syst.. 27(6):1049-1096.
Hicks MW, Kakkar P, Moore JT, Gunter CA, Nettles S.  1998.  PLAN: a packet language for active networks. SIGPLAN Not.. 34(1):86-93.
Hicks MW.  2007.  Analyzing information flow. Conference on Programming Language Design and Implementation: Proceedings of the 2007 workshop on Programming languages and analysis for security.

Pages