Publications

Export 337 results:
Author Title Type [ Year(Desc)]
Filters: First Letter Of Title is T  [Clear All Filters]
2008
Jia X-P, Peng H, Zheng Q-L, Zhuolin Jiang, Li Z.  2008.  A topic-based Document Correlation Model. Machine Learning and Cybernetics, 2008 International Conference on. 5:2487-2491.
Jimmy Lin, Wu P, Abels E.  2008.  Toward automatic facet analysis and need negotiation: Lessons from mediated search. ACM Transactions on Information Systems (TOIS). 27(1):6:1–6:42-6:1–6:42.
Vishkin U.  2008.  Toward Realizing a PRAM-on-a-Chip Vision. Lecture Notes in Computer Science. 4854:5-6.
Pappafotis N, Bejgerowski W, Gullapalli R, Simard MJ, Gupta SK, Desai JP.  2008.  Towards Design and Fabrication of a Miniature MRI-Compatible Robot for Applications in Neurosurgery. :747-754.
Kembhavi A, Farrell R, Luo Y, Jacobs DW, Duraiswami R, Davis LS.  2008.  Tracking Down Under: Following the Satin Bowerbird. Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on. :1-7.
Arya S, Fonseca G, Mount D.  2008.  Tradeoffs in Approximate Range Searching Made Simpler. Computer Graphics and Image Processing, 2008. SIBGRAPI '08. XXI Brazilian Symposium on. :237-244.
Kim J-S, Nam B, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2008.  Trade-offs in matching jobs and balancing load for distributed desktop grids. Future Generation Computer Systems. 24(5):415-424.
Snellman EA, Colwell RR.  2008.  Transesterification activity of a novel lipase from Acinetobacter venetianus RAG-1. Antonie van Leeuwenhoek. 94(4):621-625.
Bhatia S, Motiwala M, Muhlbauer W, Mundada Y, Valancius V, Bavier A, Feamster N, Peterson L, Rexford J.  2008.  Trellis: a platform for building flexible, fast virtual networks on commodity hardware. Proceedings of the 2008 ACM CoNEXT Conference. :72:1–72:6-72:1–72:6.
Zheleva E, Kolcz A, Getoor L.  2008.  Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Transactions on Information Systems (TOIS). 27(1):3:1–3:27-3:1–3:27.
Sethupathy P, Hannenhalli S.  2008.  A Tutorial of the Poisson Random Field Model in Population Genetics. Advances in Bioinformatics. 2008:1-9.
2009
Studer A, Elaine Shi, Bai F, Perrig A.  2009.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs. :1-9.
Chuang W-H, Swaminathan A, M. Wu.  2009.  Tampering identification using Empirical Frequency Response. Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on. :1517-1520.
Shao-fa JZL, Hong-li JXZ.  2009.  Target Tracking Based on Nonparametric Clustering and Multi-Scale Images. JSCUT (Natural Science Edition). 37(1):34-41.
Kuter U, Nau DS, Pistore M, Traverso P.  2009.  Task decomposition on abstract states, for planning under nondeterminism. Artificial Intelligence. 173(5–6):669-695.
Song S, JaJa JF.  2009.  Techniques to audit and certify the long-term integrity of digital archives. International Journal on Digital Libraries. 10(2):123-131.
Wang TD, Plaisant C, Shneiderman B, Spring N, Roseman D, Marchand G, Mukherjee V, Smith M.  2009.  Temporal Summaries: Supporting Temporal Categorical Searching, Aggregation and Comparison. Visualization and Computer Graphics, IEEE Transactions on. 15(6):1049-1056.
Wang TD, Plaisant C, Shneiderman B, Spring N, Roseman D, Marchand G, Mukherjee V, Smith M.  2009.  Temporal Summaries: Supporting Temporal Categorical Searching, Aggregation and Comparison. IEEE Transactions on Visualization and Computer Graphics. 15(6):1049-1056.
Snover M, Madnani N, Dorr BJ, Schwartz R.  2009.  TER-Plus: paraphrase, semantic, and alignment enhancements to Translation Edit Rate. Machine Translation. 23(2):117-127.
Hayden CM, Hardisty EA, Hicks MW, Foster JS.  2009.  A Testing Based Empirical Study of Dynamic Software Update Safety Restrictions. Technical Reports of the Computer Science Department.
Memon AM.  2009.  TESTING EVENT-DRIVEN SOFTWARE–THE NEXT QA CHALLENGE? Software Engineering and DevelopmentSoftware Engineering and Development. :187-187.
Strecker J, Memon AM.  2009.  Testing graphical user interfaces. Encyclopedia of Information Science and Technology.
Furr M, An J-hoon(D), Foster JS, Hicks MW.  2009.  Tests to the left of me, types to the right: how not to get stuck in the middle of a ruby execution. Proceedings for the 1st workshop on Script to Program Evolution. :14-16.
Swamy N, Hicks MW, Bierman GM.  2009.  A theory of typed coercions and its applications. Proceedings of the 14th ACM SIGPLAN international conference on Functional programming. :329-340.
Ward NL, Challacombe JF, Janssen PH, Henrissat B, Coutinho PM, Wu M, Xie G, Haft DH, Sait M, Badger J et al..  2009.  Three genomes from the phylum Acidobacteria provide insight into the lifestyles of these microorganisms in soils.. Appl Environ Microbiol. 75(7):2046-56.

Pages