Publications
Export 896 results:
[ Author] Title Type Year Filters: First Letter Of Last Name is S [Clear All Filters]
2002. Extracting articulation models from CAD models of parts with curved surfaces. TRANSACTIONS-AMERICAN SOCIETY OF MECHANICAL ENGINEERS JOURNAL OF MECHANICAL DESIGN. 124(1):106-114.
2001. Assessment of the k-epsilon turbulence model for compressible flows using direct simulation data. 39th AIAA Aerospace Sciences Meeting and Exhibit.
2000. Assessment of Temperature Fluctuation Models for RANS Simulations of Hypersonic Reacting Flows. 38th AIAA Aerospace Sciences Meeting and Exhibit.
2004. HTN planning for Web Service composition using SHOP2. Web Semantics: Science, Services and Agents on the World Wide Web. 1(4):377-396.
2003. Hierarchical dwarfs for the rollup cube. Proceedings of the 6th ACM international workshop on Data warehousing and OLAP - DOLAP '03. :17-17.
2002. Dwarf. Proceedings of the 2002 ACM SIGMOD international conference on Management of data - SIGMOD '02. :464-464.
2005. Maintaining Implicated Statistics in Constrained Environments. Data Engineering, International Conference on. :730-741.
2005. A Type and Effect System for Flexible Abstract Interpretation of Java: (Extended Abstract). Electronic Notes in Theoretical Computer Science. 131:111-124.
1998. Assessing users' subjective satisfaction with the Information System for Youth Services (ISYS). Institute for Systems Research Technical Reports.
1997. Comprehension and object recognition capabilities for presentations of simultaneous video key frame surrogates. Research and Advanced Technology for Digital LibrariesResearch and Advanced Technology for Digital Libraries. 1324:41-54.
2009. CAPE: Automatically Predicting Changes in Group Behavior. Mathematical Methods in Counterterrorism. :253-269.
2008. The SOMA Terror Organization Portal (STOP): social network and analytic tools for the real-time analysis of terror groups. Social Computing, Behavioral Modeling, and Prediction. :9-18.
2007. Soma models of the behaviors of stakeholders in the afghan drug economy: A preliminary report. Proc. 2007 Intl. Conf. on Computational Cultural Dynamics. :78-86.
2008. Leveraging social context for searching social media. Proceedings of the 2008 ACM workshop on Search in social media. :91-94.
2005. A framework for decomposing reputation in MAS into competence and integrity. Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. :1253-254.
2009. Learning to trust in the competence and commitment of agents. Autonomous Agents and Multi-Agent Systems. 18(1):36-82.
2009. Analyzing (social media) networks with NodeXL. Proceedings of the fourth international conference on Communities and technologies. :255-264.
2004. PAWN: Producer-Archive Workflow Network in support of digital preservation. UMIACS-TR-2004:2006-2006.
2009. An Implementation of the Audit Control Environment (ACE) to Support the Long Term Integrity of Digital Archives. Proceedings of DigCCurr2009 Digital Curation: Practice, Promise and Prospects. :164-164.
2003. Recovery of a Digital Image Collection Through the SDSC/UMD/NARA Prototype Persistent Archive. UMIACS-TR-2003-105
2010. Monitoring distributed collections using the Audit Control Environment (ACE). Proceedings of the 2010 Roadmap for Digital Preservation Interoperability Framework Workshop. :13:1–13:5-13:1–13:5.
2006. Synthetic‐perturbation techniques for screening shared memory programs. Software: Practice and Experience. 24(8):679-701.
1993. Using Synthetic-Perturbation Techniques for Tuning Shared Memory Programs. Parallel Processing, 1993. ICPP 1993. International Conference on. 2:2-10.