Publications

Export 7148 results:
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Kembhavi A, Siddiquie B, Miezianko R, McCloskey S, Davis LS.  2009.  Incremental Multiple Kernel Learning for object recognition. Computer Vision, 2009 IEEE 12th International Conference on. :638-645.
Kembhavi A, Tom Yeh, Davis LS.  2010.  Why Did the Person Cross the Road (There)? Scene Understanding Using Probabilistic Logic Models and Common Sense Reasoning Computer Vision – ECCV 2010. 6312:693-706.
Kembhavi A, Siddiquie B, Miezianko R, McCloskey S, Davis LS, Schwartz WR, Harwood D, Gupta A, Farrell R, Luo Y et al..  2009.  Scene it or not? incremental multiple kernel learning for object detection Proceedings of the International Conference on Computer Vision.
Kelly W, Pugh W.  1995.  A unifying framework for iteration reordering transformations. Algorithms and Architectures for Parallel Processing, 1995. ICAPP 95. IEEE First ICA/sup 3/PP., IEEE First International Conference on. 1:153-162.
Kelly W, Pugh W, Rosser E.  1995.  Code generation for multiple mappings. Frontiers of Massively Parallel Computation, 1995. Proceedings. Frontiers '95., Fifth Symposium on the. :332-341.
Kelly W, Pugh W, Rosser E, Shpeisman T.  1996.  Transitive closure of infinite graphs and its applications. Languages and Compilers for Parallel Computing. :126-140.
Kelley DR, Kingsford C.  2011.  Extracting Between-Pathway Models from E-MAP Interactions Using Expected Graph Compression. Journal of Computational Biology. 18(3):379-390.
Kelley DR, Liu B, Delcher AL, Pop M, Salzberg SL.  2012.  Gene Prediction with Glimmer for Metagenomic Sequences Augmented by Classification and Clustering. Nucleic Acids ResearchNucl. Acids Res.. 40(1):e9-e9-e9-e9.
Keleher PJ, Spring N, Bhattacharjee B.  2007.  Chit-based access control.
Keleher P, Bhattacharjee B, Silaghi B.  2002.  Are virtualized overlay networks too much of a good thing? Peer-to-Peer Systems. :225-231.
Keleher PJ, Hollingsworth J, Perkovic D.  1999.  Exposing Application Alternatives. Distributed Computing Systems, International Conference on. :0384-0384.
Keil-Slawik R, Plaisant C, Shneiderman B.  1993.  Remote direct manipulation: A case study of a telemedicine workstation. Sparks of innovation in human-computer interactionSparks of innovation in human-computer interaction. :51-51.
Keil M, Mount D, Wismath SK.  2000.  Visibility stabs and depth-first spiralling on line segments in output sensitive time. International Journal of Computational Geometry and Applications. 10(5):535-552.
Keeley MB, Wood MA, Isiegas C, Stein J, Hellman K, Hannenhalli S, Abel T.  2006.  Differential Transcriptional Response to Nonassociative and Associative Components of Classical Fear Conditioning in the Amygdala and Hippocampus. Learning & MemoryLearn. Mem.. 13(2):135-142.
Kee H, Shen C-C, Bhattacharyya SS, Wong I, Rao Y, Kornerup J.  2012.  Mapping Parameterized Cyclo-static Dataflow Graphs onto Configurable Hardware. Journal of Signal Processing Systems. 66(3):285-301.
Kee H, Bhattacharyya SS, Wong I, Rao Y.  2010.  FPGA-based design and implementation of the 3GPP-LTE physical layer using parameterized synchronous dataflow techniques. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1510-1513.
Kee H, Bhattacharyya SS, Kornerup J.  2010.  Efficient static buffering to guarantee throughput-optimal FPGA implementation of synchronous dataflow graphs. 2010 International Conference on Embedded Computer Systems (SAMOS). :136-143.
Kedilaya S, Plishker W, Purkovic A, Johnson B, Bhattacharyya SS.  2011.  Model-based precision analysis and optimization for digital signal processors. Proceedings of the European Signal Processing Conference. :506-510.
Keceli F, Tzannes A, Caragea GC, Barua R, Vishkin U.  2011.  Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1282-1291.
Kearsley G, Shneiderman B.  1998.  Engagement Theory: A Framework for Technology-Based Teaching and Learning.. Educational TechnologyEducational Technology. 38(5):20-23.
Kawahara AY, Ohshima I, Kawakita A, Regier JC, Mitter C, Cummings MP, Davis DR, Wagner DL, De Prinis J, Lopez-Vaamonde C.  2011.  Increased gene sampling provides stronger support for higher-level groups within gracillariid leaf mining moths and relatives (Lepidoptera: Gracillariidae). BMC Evol Biol. 11:182
Kavetsky R, Gupta SK.  2010.  Developing Autonomy for Unmanned Surface Vehicles by Using Virtual Environments.
Kauniskangas H, Sauvola J, Pietikainen M, Doermann D.  1997.  Content-based Image Retrieval Using Composite Features. Proceedings of the 1997 Scandinavian Conference on Image Analysis. :35-42.
Katz J.  2004.  Binary tree encryption: Constructions and applications. Information Security and Cryptology-ICISC 2003. :1-11.
Katz J.  2007.  Efficient cryptographic protocols based on the hardness of learning parity with noise. Proceedings of the 11th IMA international conference on Cryptography and coding. :1-15.

Pages