Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Conference Papers
Mishra A, Rozner E, Banerjee S, Arbaugh WA.  2005.  Exploiting partially overlapping channels in wireless networks: Turning a peril into an advantage. Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. :29-29.
Lee WJ, Raschid L, Sayyadi H, Srinivasan P.  2008.  Exploiting ontology structure and patterns of annotation to mine significant associations between pairs of controlled vocabulary terms. Data Integration in the Life Sciences. :44-60.
Lacroix Z, Moths T, Parekh K, Raschid L, Vidal M-E.  2004.  Exploiting multiple paths to express scientific queries. 16th International Conference on Scientific and Statistical Database Management, 2004. Proceedings. :357-360.
Andrade H, Kurc T, Sussman A, Saltz J.  2003.  Exploiting Functional Decomposition for Efficient Parallel Processing of Multiple Data Analysis Queries. Parallel and Distributed Processing Symposium, International. :81a-81a.
Deshpande A, Guestrin C, Hong W, Madden S.  2005.  Exploiting Correlated Attributes in Acquisitional Query Processing. 21st International Conference on Data Engineering, 2005. ICDE 2005. Proceedings. :143-154.
Raschid L, Sellis T, Lin CC.  2000.  Exploiting concurrency in a DBMS implementation for production systems. Proceedings of the first international symposium on Databases in parallel and distributed systems. :34-45.
Morselli R, Bhattacharjee B, Katz J, Marsh M.  2007.  Exploiting approximate transitivity of trust. Broadband Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth International Conference on. :515-524.
Vishkin U, Dascal S, Berkovich E, Nuzman J.  1998.  Explicit Multi-Threading (XMT) bridging models for instruction parallelism (extended abstract). Proceedings of the tenth annual ACM symposium on Parallel algorithms and architectures. :140-151.
Delis A, Raschid L, Sellis T.  1992.  Experiments on the concurrent rule execution in database systems. Tools with Artificial Intelligence, 1992. TAI'92, Proceedings., Fourth International Conference on. :405-412.
Shneiderman B.  1975.  Experimental testing in programming languages, stylistic considerations and design techniques. Proceedings of the May 19-22, 1975, national computer conference and exposition. :653-656.
Votta LG, Porter A, Perry D.  1995.  Experimental software engineering: A report on the state of the art. INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING. 17:277-277.
Oard D, DeClaris N, Dorr BJ, Faloutsos C, Marchionini G.  1995.  Experimental investigation of high performance cognitive and interactive text filtering. , IEEE International Conference on Systems, Man and Cybernetics, 1995. Intelligent Systems for the 21st Century. 5:4398-4403vol.5-4398-4403vol.5.
Panjwani S, Tan S, Jarrin KM, Cukier M.  2005.  An experimental evaluation to determine if port scans are precursors to an attack. :602-611.
Gupta H, Agrawala AK, Pruthi T, Shekhar C, Chellappa R.  2002.  An experimental evaluation of linear and kernel-based methods for face recognition. Applications of Computer Vision, 2002. (WACV 2002). Proceedings. Sixth IEEE Workshop on. :13-18.
Lefever RM, Cukier M, Sanders WH.  2003.  An experimental evaluation of correlated network partitions in the Coda distributed file system. :273-282.
Reif JH, LaBean TH, Pirrung M, Rana VS, Guo B, Kingsford C, Wickham GS.  2002.  Experimental Construction of Very Large Scale DNA Databases with Associative Search. DNA computing: 7th International Workshop on DNA-Based Computers, DNA 7, Tampa, FL, USA, June 10-13, 2001: revised papers. 7:231-231.
Porter A, Votta LG.  1994.  An experiment to assess different defect detection methods for software requirements inspections. Proceedings of the 16th international conference on Software engineering. :103-112.
Wonnacott WPD.  1994.  Experiences with Constraint-based Array Dependence Analysis. Principles and practice of constraint programming: second international workshop, PPCP'94, Rosario, Orcas Island, WA, USA, May 2-4, 1994: proceedings. :312-312.
Hicks MW, Moore JT, Wetherall D, Nettles S.  2002.  Experiences with capsule-based active networking. DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :16-24.
Hicks MW, Morrisett G, Grossman D, Jim T.  2004.  Experience with safe manual memory-management in cyclone. Proceedings of the 4th international symposium on Memory management. :73-84.
Basili VR, Costa P, Lindvall M, Mendonca M, Seaman C, Tesoriero R, Zelkowitz MV.  2001.  An experience management system for a software engineering research organization. Software Engineering Workshop, 2001. Proceedings. 26th Annual NASA Goddard. :29-35.
Elgammal A, Shet V, Yacoob Y, Davis LS.  2003.  Exemplar-based tracking and recognition of arm gestures. Image and Signal Processing and Analysis, 2003. ISPA 2003. Proceedings of the 3rd International Symposium on. 2:656-661Vol.2-656-661Vol.2.
Spencer M, Ferreira R, Beynon M, Kurc T, Catalyurek U, Sussman A, Saltz J.  2002.  Executing Multiple Pipelined Data Analysis Operations in the Grid. SC Conference. :54-54.
Fekete J-D, Plaisant C.  1999.  Excentric labeling: dynamic neighborhood labeling for data visualization. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :512-519.
Stonedahl F, Rand W, Wilensky U.  2010.  Evolving viral marketing strategies. Proceedings of the 12th annual conference on Genetic and evolutionary computation. :1195-1202.

Pages