Publications

Export 7151 results:
Author Title [ Type(Asc)] Year
Conference Papers
Meyer R, Cukier M.  2006.  Assessing the Attack Threat due to IRC Channels. :467-472.
Kraus S, Perlis D.  1989.  Assessing others' knowledge and ignorance. Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems.
Vasan A, Memon AM.  2004.  ASPIRE: automated systematic protocol implementation robustness evaluation. Software Engineering Conference, 2004. Proceedings. 2004 Australian. :241-250.
Dumitras T, Efstathopoulos P.  2012.  Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
Zhu G, Jaeger S, Doermann D.  2006.  ARobust Stamp Detection Framework on Degraded Documents. International Conference on Document Recognition and Retrieval XIII. :1-9.
Xingyuan L, Doermann D, Oh W, Gao W.  1999.  ARobust Method for Unknown Forms Analysis. ICDAR. :531-534.
Drury J, Resnik P, Weinberg A, Gennari S, Aoshima S.  2002.  Argument structure saturation in a constraint based model.
Balkan AO, Qu G, Vishkin U.  2008.  An area-efficient high-throughput hybrid interconnection network for single-chip parallel processing. Proceedings of the 45th annual Design Automation Conference. :435-440.
Varshavsky A, Chen MY, de Lara E, Froehlich J, Haehnel D, Hightower J, LaMarca A, Potter F, Sohn T, Tang K et al..  2005.  Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
Zazworka N, Stapel K, Knauss E, Shull F, Basili VR, Schneider K.  2010.  Are developers complying with the process: an XP study. Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement. :14:1–14:10-14:1–14:10.
Kobla V, Doermann D, Lin K-I.  1996.  Archiving, indexing, and retrieval of video in compressed domain. SPIEConference on Multimedia Storage and Archiving Systems. 2916:78-89.
Petroni Jr NL, Fraser T, Walters AA, Arbaugh WA.  2006.  An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
Kianzad V, Saha S, Schlessman J, Aggarwal G, Bhattacharyya SS, Wolf W, Chellappa R.  2005.  An architectural level design methodology for embedded face detection. Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. :136-141.
Ray A, Cleaveland R.  2003.  Architectural Interaction Diagrams: AIDs for System Modeling. Software Engineering, International Conference on. :396-396.
Tahmoush D, Samet H.  2006.  Archimedes, an archive of medical images. American Medical Informatics Association 2006 Annual Symposium Proceedings Biomedical and Health Informatics: From Foundations to Applications to Policy, Washington, DC, DW Bates, JH Holmes, and G. Kuperman, editors.
Balkan AO, Qu G, Vishkin U.  2004.  Arbitrate-and-move primitives for high throughput on-chip interconnection networks. Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on. 2:II-441-4Vol.2-II-441-4Vol.2.
Sayeed A, Elsayed T, Garera N, Alexander D, Xu T, Oard D, Yarowsky D, Piatko C.  2009.  Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
Cukier M, Ren J, Sabnis C, Henke D, Pistole J, Sanders WH, Bakken DE, Berman ME, Karr DA, Schantz RE.  1998.  AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
Wu Y, Raschid L.  2009.  ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
Zhang Y, Manister E, Kraus S, V.S. Subrahmanian.  2005.  Approximation results for probabilistic survivability. Multi-Agent Security and Survivability, 2005 IEEE 2nd Symposium on. :1-10.
Pei G, Anil Kumar VS, Parthasarathy S, Srinivasan A.  2011.  Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
Srinivasan A.  2007.  Approximation algorithms for stochastic and risk-averse optimization. Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms. :1305-1313.
Arya S, Cheng S-W, Mount D.  1998.  Approximation algorithms for multiple-tool miling. Proceedings of the fourteenth annual symposium on Computational geometry. :297-306.
Chafekar D, Kumart VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Approximation Algorithms for Computing Capacity of Wireless Networks with SINR Constraints. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1166-1174.
Auer P, Long PM, Srinivasan A.  1997.  Approximating hyper-rectangles: learning and pseudo-random sets. Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. :314-323.

Pages