Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Helman D, JaJa JF.  1999.  Designing practical efficient algorithms for symmetric multiprocessors. Algorithm Engineering and Experimentation. :663-663.
Helman DR, JaJa JF, Bader DA.  1998.  A new deterministic parallel sorting algorithm with an experimental evaluation. Journal of Experimental Algorithmics (JEA). 3
Helman DR, JaJa JF.  1999.  Prefix computations on symmetric multiprocessors. Parallel and Distributed Processing, 1999. 13th International and 10th Symposium on Parallel and Distributed Processing, 1999. 1999 IPPS/SPDP. Proceedings. :7-13.
Helman D, JaJa JF.  1995.  Efficient image processing algorithms on the scan line array processor. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 17(1):47-56.
Helman DR, Bader DA, JaJa JF.  1998.  A Parallel Sorting Algorithm With an Experimental Study. UMIACS-TR-95-102
Hemaraj Y, Sen M, Shekhar R, Bhattacharyya SS.  2006.  Model-based mapping of image registration applications onto configurable hardware. Signals, Systems and Computers, 2006. ACSSC'06. Fortieth Asilomar Conference on. :1453-1457.
Hendler J, Nau DS, Parsia B, Sirin E, Wu D.  2006.  Automatic web services composition using Shop2.
Hennacy K, Swamy N, Perlis D.  2003.  RGL study in a hybrid real-time system. Proceedings of the IASTED NCI.
Hermjakob U, Knight K, Daumé H.  2008.  Name translation in statistical machine translation: Learning when to transliterate. Proceedings of ACL-08: HLT. :389-397.
Herrmann JW, Cooper J, Gupta SK, Hayes CC, Ishii K, Kazmer D, Sandborn PA, Wood WH.  2004.  New directions in design for manufacturing. :1-9.
Hert CA, Liddy ED, Shneiderman B, Marchionini G.  2003.  Supporting statistical electronic table usage by citizens. Commun. ACM. 46(1):52-54.
Herve J, Aloimonos Y.  1990.  Catastrophe theory and computational vision. Proc. AAAI-90 Workshop on Qualitative Vision. :96-100.
Herve J-Y, Aloimonos Y.  1992.  Exploratory active vision: theory. Proceedings of 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1992. :10-15.
Hesse BW, Shneiderman B.  2007.  eHealth Research from the User’s Perspective. American Journal of Preventive Medicine. 32(5, Supplement):S97-S103-S97-S103.
Hettinger AZ, Rackoff A, Wongsuphasawat K, Cheng H, Fairbanks RJ, Plaisant C, Smith MS.  2011.  Improved Identification and Visualization of Emergency Department Patient Visits. Annals of Emergency Medicine. 58(4):S309-S309.
Heyman DP, O'Leary DP.  1995.  What is Fundamental for Markov Chains: First Passage Times, Fundamental Matrices, and Group Generalized Inverses. Proceedings of the Second International Workshop on Markov ChainsProceedings of the Second International Workshop on Markov Chains. :151-161.
Heyman DP, O'Leary DP.  1998.  Overcoming Instability In Computing The Fundamental Matrix For A Markov Chain. SIAM Journal on Matrix Analysis and Applications. 19(2):534-540.
Hicks MW, Moore JT, Nettles SM.  1997.  The measured cost of copying garbage collection mechanisms. SIGPLAN Not.. 32(8):292-305.
Hicks MW, Nettles S, Seong-Kyu S, Shannon S.  2011.  Evolution in Action: Using Active Networking to Evolve Network Support for Mobility. IFIP Lecture Notes in Computer Science (LNCS). 2546(2546):146-161.
Hicks MW, Moore J, Nettles S.  2001.  Compiling PLAN to SNAP. Active NetworksActive Networks. 2207:134-151.
Hicks MW, Kakkar P, Moore JT, Gunter CA, Nettles S.  1998.  PLAN: a packet language for active networks. SIGPLAN Not.. 34(1):86-93.
Hicks MW, Keromytis AD, Smith JM.  2003.  A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
Hicks MW, Nettles S.  2005.  Dynamic software updating. ACM Trans. Program. Lang. Syst.. 27(6):1049-1096.
Hicks MW.  2007.  Analyzing information flow. Conference on Programming Language Design and Implementation: Proceedings of the 2007 workshop on Programming languages and analysis for security.
Hicks MW, Swamy N, Tsang S.  2007.  Toward Specifying and Validating Cross-Domain Policies. Technical Reports from UMIACS.

Pages