Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Conference Papers
Landau G, Vishkin U.  1993.  Two dimensional pattern matching in a digitized image. Combinatorial Pattern Matching. :134-151.
Kim Y-S, Dagalakis NG, Gupta SK.  2011.  A Two Degree of Freedom Nanopositioner With Electrothermal Actuator for Decoupled Motion. :447-457.
Sankaranarayanan J, Samet H, Teitler BE, Lieberman MD, Sperling J.  2009.  TwitterStand: news in tweets. Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems. :42-51.
Shneiderman B, Rao R, Andrews K, Ahlberg C, Brodbeck D, Jewitt T, Mackinlay J.  2005.  Turning information visualization innovations into commercial products: lessons to guide the next success. IEEE Symposium on Information Visualization, 2005. INFOVIS 2005. :241-244.
Martin, M.P, Smits A, Wu M, Ringuette M.  2006.  The turbulence structure of shockwave and boundary layer interaction in a compression corner. 44th AIAA Aerospace Meeting and Exhibit. 2006
Acharya A, Uysal M, Bennett R, Mendelson A, Beynon M, Hollingsworth J, Saltz J, Sussman A.  1996.  Tuning the performance of I/O-intensive parallel applications. Proceedings of the fourth workshop on I/O in parallel and distributed systems: part of the federated computing research conference. :15-27.
Morselli R, Bhattacharjee B, Katz J, Keleher P.  2004.  Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
Hicks B, King D, McDaniel P, Hicks MW.  2006.  Trusted declassification:: high-level policy for a security-typed language. Proceedings of the 2006 workshop on Programming languages and analysis for security. :65-74.
Haghpanah Y, desJardins M, others.  2011.  A trust model for supply chain management. The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 3. :1375-1376.
Friedman B, Thomas JC, Grudin J, Nass C, Nissenbaum H, Schlager M, Shneiderman B.  1999.  Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
Sengupta B, Cleaveland R.  2003.  TRIM: A tool for triggered message sequence charts. Computer Aided Verification. :106-109.
Lumezanu C, Baden R, Spring N, Bhattacharjee B.  2009.  Triangle inequality variations in the internet. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :177-183.
Albanese M, V.S. Subrahmanian.  2007.  T-rex: A domain-independent system for automated cultural information extraction. Proceedings of the First International Conference on Computational Cultural Dynamics (ICCCD 2007).
Browne HK, Arbaugh WA, McHugh J, Fithen WL.  2001.  A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
Bhatia S, Motiwala M, Muhlbauer W, Mundada Y, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
Gomez JAG, Buck-Coleman A, Plaisant C, Shneiderman B.  2011.  TreeVersity: Comparing tree structures by topology and node's attributes differences. 2011 IEEE Conference on Visual Analytics Science and Technology (VAST). :275-276.
Gomez JAG, Buck-Coleman A, Plaisant C, Shneiderman B.  2011.  TreeVersity: Comparing tree structures by topology and node's attributes differences. Visual Analytics Science and Technology (VAST), 2011 IEEE Conference on. :275-276.
Daumé H, Marcu D.  2004.  A tree-position kernel for document compression. Proceedings of the Fourth Document Understanding Conference (DUC 2004). :6-7.
Johnson B, Shneiderman B.  1991.  Tree-maps: a space-filling approach to the visualization of hierarchical information structures. , IEEE Conference on Visualization, 1991. Visualization '91, Proceedings. :284-291.
Pratikakis P, Spacco J, Hicks MW.  2004.  Transparent proxies for java futures. Proceedings of the 19th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications. :206-223.
Hicks MW, Jagannathan S, Kelsey R, Moore JT, Ungureanu C.  1999.  Transparent communication for distributed objects in Java. Proceedings of the ACM 1999 conference on Java Grande. :160-170.
Doermann D, Ma H, Karagol-Ayan B, Oard D.  2001.  Translation lexicon acquisition from bilingual dictionaries. Proceedings of SPIE. 4670:37-37.
Alford R, Kuter U, Nau DS.  2009.  Translating HTNs to PDDL: A small amount of domain knowledge can go a long way. :1629-1634.
Young-Myers H, Raschid L.  1993.  Transitive closure: an experimental case study of three multithreaded database algorithms on a shared memory multiprocessor. Parallel and Distributed Information Systems, 1993., Proceedings of the Second International Conference on. :255-259.
Hannenhalli S, Pevzner PA.  1995.  Transforming men into mice (polynomial algorithm for genomic distance problem). Foundations of Computer Science, Annual IEEE Symposium on. :581-581.

Pages