Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Panjwani S, Tan S, Jarrin KM, Cukier M.  2005.  An experimental evaluation to determine if port scans are precursors to an attack. :602-611.
Potter R, Berman M, Shneiderman B.  1989.  An experimental evaluation of three touch screen strategies within a hypertext database. International Journal of Human-Computer Interaction. 1(1):41-52.
Joshi K, Cukier M, Sanders W.  2002.  Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol. Dependable Computing EDCC-4. 2485:644-648.
Gupta H, Agrawala AK, Pruthi T, Shekhar C, Chellappa R.  2002.  An experimental evaluation of linear and kernel-based methods for face recognition. Applications of Computer Vision, 2002. (WACV 2002). Proceedings. Sixth IEEE Workshop on. :13-18.
Lefever RM, Cukier M, Sanders WH.  2003.  An experimental evaluation of correlated network partitions in the Coda distributed file system. :273-282.
Reif JH, LaBean TH, Pirrung M, Rana VS, Guo B, Kingsford C, Wickham GS.  2002.  Experimental Construction of Very Large Scale DNA Databases with Associative Search. DNA computing: 7th International Workshop on DNA-Based Computers, DNA 7, Tampa, FL, USA, June 10-13, 2001: revised papers. 7:231-231.
Powers M, Lashley C, Sanchez P, Shneiderman B.  1984.  An experimental comparison of tabular and graphic data presentation. International Journal of Man-Machine Studies. 20(6):545-566.
Ewing J, Mehrabanzad S, Sheck S, Ostroff D, Shneiderman B.  1986.  An experimental comparison of a mouse and arrow-jump keys for an interactive encyclopedia. International Journal of Man-Machine Studies. 24(1):29-45.
Barrett C, Cook D, Hicks G, Faber V, Marathe A, Marathe M, Srinivasan A, Sussmann Y, Thornquist H.  2001.  Experimental Analysis of Algorithms for Bilateral-Contract Clearing Mechanisms Arising in Deregulated Power Industry. Algorithm EngineeringAlgorithm Engineering. 2141:172-184.
Di Persio T, Isbister D, Shneiderman B.  1980.  An experiment using memorization/reconstruction as a measure of programmer ability. International Journal of Man-Machine Studies. 13(3):339-354.
Porter A, Siy HP, Toman CA, Votta LG.  1997.  An experiment to assess the cost-benefits of code inspections in large scale software development. IEEE Transactions on Software Engineering. 23(6):329-346.
Porter A, Votta LG.  1994.  An experiment to assess different defect detection methods for software requirements inspections. Proceedings of the 16th international conference on Software engineering. :103-112.
Wonnacott WPD.  1994.  Experiences with Constraint-based Array Dependence Analysis. Principles and practice of constraint programming: second international workshop, PPCP'94, Rosario, Orcas Island, WA, USA, May 2-4, 1994: proceedings. :312-312.
Hicks MW, Moore JT, Wetherall D, Nettles S.  2002.  Experiences with capsule-based active networking. DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :16-24.
Ramasamy HGV, Pandey P, Cukier M, Sanders WH.  2008.  Experiences with building an intrusion-tolerant group communication system. Software: Practice and Experience. 38(6):639-666.
Zelkowitz MV, Kowalchack B, Itkin D, Herman L.  1989.  Experiences building a syntax-directed editor. Software Engineering Journal. 4(6):294-294.
Hicks MW, Morrisett G, Grossman D, Jim T.  2004.  Experience with safe manual memory-management in cyclone. Proceedings of the 4th international symposium on Memory management. :73-84.
Basili VR, Costa P, Lindvall M, Mendonca M, Seaman C, Tesoriero R, Zelkowitz MV.  2001.  An experience management system for a software engineering research organization. Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard. :29-35.
Schneider K, von Hunnius J-P, Basili VR.  2002.  Experience in implementing a learning software organization. Software, IEEE. 19(3):46-49.
Basili VR, Seaman C.  2002.  The Experience factory organization. IEEE Software. 19(3):30-31.
Katz J, Koo CY.  2006.  On expected constant-round protocols for Byzantine agreement. Advances in Cryptology-CRYPTO 2006. :445-462.
Katz J, Koo C-Y.  2009.  On expected constant-round protocols for Byzantine agreement. Journal of Computer and System Sciences. 75(2):91-112.
Myers DS, Bazinet AL, Cummings MP.  2008.  Expanding the reach of Grid computing: combining Globus- and BOINC-based systems. Grids for Bioinformatics and Computational BiologyGrids for Bioinformatics and Computational Biology. :71-85.
Zaphiris P, Shneiderman B, Norman KL.  2002.  Expandable indexes vs. sequential menus for searching hierarchies on the World Wide Web. Behaviour & Information Technology. 21(3):201-207.
Pratikakis P, Foster JS, Hicks MW.  2006.  Existential Label Flow Inference Via CFL Reachability. Static AnalysisStatic Analysis. 4134:88-106.

Pages