Publications

Export 7151 results:
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Kee H, Bhattacharyya SS, Wong I, Rao Y.  2010.  FPGA-based design and implementation of the 3GPP-LTE physical layer using parameterized synchronous dataflow techniques. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1510-1513.
Elman H, Ramage A.  2006.  Fourier analysis of multigrid for a model two-dimensional convection-diffusion equation. BIT Numerical Mathematics. 46(2):283-306.
Chan TF, Elman H.  1989.  Fourier Analysis of Iterative Methods for Elliptic Problems. SIAM Review. 31(1):20-49.
Stewart G.W.  1999.  Four algorithms for the efficient computation of truncated pivoted QR approximations to a sparse matrix. Numerische Mathematik. 83(2):313-323.
Stewart G.W.  1998.  Four algorithms for the efficient computation of truncated pivoted QR approximation to a sparse matrix. TR-98-12
Samet H.  2006.  Foundations of Multidimensional And Metric Data Structures. :1023.
Samet H.  2006.  Foundations of Multidimensional And Metric Data Structures.
Agrawala AK, Rauscher TG.  1976.  Foundations of microprogramming: architecture, software, and applications.
Shaman J., Solomon S., Colwell RR, Field C.B.  2013.  Fostering advances in interdisciplinary climate science. Proceedings of the National Academy of Sciences. (Supplement_114869243Supplement_1):3653-3656.
Canetti R, Halevi S, Katz J.  2007.  A forward-secure public-key encryption scheme. Journal of Cryptology. 20(3):265-294.
Katz J.  2002.  A forward-secure public-key encryption scheme.
Canetti R, Halevi S, Katz J.  2003.  A forward-secure public-key encryption scheme. Advances in Cryptology—Eurocrypt 2003. :646-646.
Kuter U, Nau DS.  2004.  Forward-chaining planning in nondeterministic domains. :513-518.
Katz J, Ostrovsky R, Yung M.  2003.  Forward secrecy in password-only key exchange protocols. Proceedings of the 3rd international conference on Security in communication networks. :29-44.
Kreitzberg CB, Shneiderman B.  1990.  FORTRAN Programming: A Spiral Approach.
Stewart G.W.  2003.  A Fortran 95 Matrix Wrapper. UMIACS-TR-2003-89
Minker J.  2007.  Forming a Computer Science Center at the University of Maryland. IEEE Annals of the History of Computing. 29(1):49-64.
Liao HS, Osada M, Shneiderman B.  1992.  A formative evaluation of three interfaces for browsing directories using dynamic queries.
Pratikakis P, Foster JS, Hicks MW, Neamtiu I.  2008.  Formalizing Soundness of Contextual Effects. Theorem Proving in Higher Order LogicsTheorem Proving in Higher Order Logics. 5170:262-277.
Bierman G, Hicks MW, Sewell P, Stoyle G.  2003.  Formalizing dynamic software updating. Proceedings of the Second International Workshop on Unanticipated Software Evolution (USE).
Ramasamy HV, Cukier M, Sanders WH.  2003.  Formal verification of an intrusion-tolerant group membership protocol. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E SERIES D. 86(12):2612-2622.
Ramasamy HV, Cukier M, Sanders WH.  2002.  Formal specification and verification of a group membership protocol for an intrusion-tolerant group communication system. :9-18.
Weissman A, Gupta SK, Fiorentini X, Sudarsan R, Sriram R.  2009.  Formal Representation of Product Design Specifications for Validating Product Design. :1411-1422.
Tian J, Zelkowitz MV.  1992.  A formal program complexity model and its application. Journal of Systems and Software. 17(3):253-266.
Ray A, Cleaveland R.  2004.  Formal Modeling Of Middleware-based Distributed Systems. Electronic Notes in Theoretical Computer Science. 108:21-37.

Pages