Publications

Export 7151 results:
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
U
Kim J-S, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2007.  Using Content-Addressable Networks for Load Balancing in Desktop Grids. UMIACS-TR-2007-16
Hollingsworth J, Miller EL.  1997.  Using content-derived names for configuration management. ACM SIGSOFT Software Engineering Notes. 22(3):104-109.
Deshpande A, Hellerstein J.  2002.  On using correlation-based synopses during query optimization. Computer Science Division (EECS), University of California Berkeley.
Jensen CS, Mark L, Roussopoulos N, Sells T.  1993.  Using differential technlques to efficiently support transaction time. The VLDB JournalVLDB Journal. 2(1):75-111.
Winder R, Reggia JA.  2004.  Using distributed partial memories to improve self-organizing collective movements. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on. 34(4):1697-1707.
Kuter U, Nau DS.  2005.  Using domain-configurable search control for probabilistic planning. 20:1169-1169.
Odom J, Hollingsworth J, DeRose L, Ekanadham K, Sbaraglia S.  2005.  Using Dynamic Tracing Sampling to Measure Long Running Programs. Proceedings of the 2005 ACM/IEEE conference on Supercomputing. :59–-59–.
Kandogan E, Shneiderman B.  1998.  Using elastic windows for World-Wide Web Browsing. CHI 98 conference summary on Human factors in computing systems. :189-190.
desJardins M, Getoor L, Koller D.  2000.  Using Feature Hierarchies in Bayesian Network Learning. Abstraction, Reformulation, and Approximation. 1864:260-270.
Nelson R, Aloimonos Y.  1988.  Using flow field divergence for obstacle avoidance in visual navigation. Science Applications International Corp, Proceedings: Image Understanding Workshop,. 2
Hierons RM, Krause P, Lüttgen G, Simons AJH, Vilkomir S, Woodward MR, Zedan H, Bogdanov K, Bowen JP, Cleaveland R et al..  2009.  Using formal specifications to support testing. ACM Computing Surveys. 41:1-76.
Zheleva E, Getoor L, Golbeck J, Kuter U.  2010.  Using friendship ties and family circles for link prediction. Advances in Social Network Mining and Analysis. :97-113.
Shakarian P, V.S. Subrahmanian, Sapino ML, Hermenegildo M, Schaub T.  2010.  Using Generalized Annotated Programs to Solve Social Network Optimization Problems. ICLP.
Stantchev G, Juba D, Dorland W, Varshney A.  2009.  Using Graphics Processors for High-Performance Computation and Visualization of Plasma Turbulence. Computing in Science Engineering. 11(2):52-59.
Yuan X, Memon AM.  2009.  Using GUI Run-Time State as Feedback for Test Automation.
Yuan X, Memon AM.  2007.  Using GUI Run-Time State as Feedback to Generate Test Cases. Software Engineering, 2007. ICSE 2007. 29th International Conference on. :396-405.
Tikir MM, Hollingsworth J.  2004.  Using Hardware Counters to Automatically Improve Memory Performance. Proceedings of the 2004 ACM/IEEE conference on Supercomputing. :46–-46–.
Buck BR, Hollingsworth J.  2000.  Using hardware performance monitors to isolate memory bottlenecks. Proceedings of the 2000 ACM/IEEE conference on Supercomputing (CDROM). :40-40.
Song Z, Roussopoulos N.  2002.  Using Hilbert curve in image storing and retrieving. Information Systems. 27(8):523-536.
Song Z, Roussopoulos N.  2000.  Using Hilbert curve in image storing and retrieving. Proceedings of the 2000 ACM workshops on Multimedia - MULTIMEDIA '00. :167-170.
Tahmoush D, Samet H.  2006.  Using image similarity and asymmetry to detect breast cancer. Proc. of SPIE Vol. 6144:61441S–1-61441S–1.
Molina J, Arbaugh WA.  2002.  Using independent auditors as intrusion detection systems. Information and Communications Security. :291-302.
Resnik P.  1995.  Using information content to evaluate semantic similarity in a taxonomy. Arxiv preprint cmp-lg/9511007.
Hochheiser H, Shneiderman B.  2001.  Using interactive visualizations of WWW log data to characterize access patterns and inform site design. Journal of the American Society for Information Science and Technology. 52(4):331-343.
Hochheiser H, Shneiderman B.  1999.  Using Interactive Visualizations of WWW Log Data to Characterize Access Patterns and Inform Site Design. Institute for Systems Research Technical Reports.

Pages