Publications
Export 337 results:
Author [ Title![(Desc)](https://www.umiacs.umd.edu/sites/all/modules/biblio/misc/arrow-desc.png)
Filters: First Letter Of Title is T [Clear All Filters]
1991. A theory of testing for real-time. , Proceedings of Sixth Annual IEEE Symposium on Logic in Computer Science, 1991. LICS '91. :110-119.
1995. Theory of the Combination of Observations Least Subject to Errors. SIAM, Philadelphia.[Translation of Gauss (1821, 1823, 1826).].
2009. A theory of typed coercions and its applications. Proceedings of the 14th ACM SIGPLAN international conference on Functional programming. :329-340.
2001. Therapeutic play with a storytelling robot. CHI '01 extended abstracts on Human factors in computing systems. :27-28.
2006. Is there a grand challenge or X-prize for data mining? Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. :954-956.
2007. Thinking in parallel: Some basic data-parallel algorithms and techniques. UMIACS, University of Maryland, College Park. 1993
2011. Threat-Aware Clustering in Wireless Sensor Networks. IFIP Advances in Information and Communication Technology (AICT). 264(264):1-12.
2003. Three dimensional acoustic scattering from an M multilayered domain via an integral equation approach. Antennas and Propagation Society International Symposium, 2003. IEEE. 1:669-672vol.1-669-672vol.1.
2009. Three genomes from the phylum Acidobacteria provide insight into the lifestyles of these microorganisms in soils.. Appl Environ Microbiol. 75(7):2046-56.
1996. A three-dimensional MOSFET solver implementing the fixed point iteration technique. Solid-State Electronics. 39(1):147-157.
2002. Three-dimensional visualization of hierarchical task network plans. In Proceedings of the 3rd International NASA Workshop on Planning and Scheduling for.
1998. Threshold-based admission control for multi-class video-on-demand systems. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :154-160.
2007. Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
2003. Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.
1987. Tight comparison bounds on the complexity of parallel sorting. SIAM J. Comput.. 16(3):458-464.
1986. Tight complexity bounds for parallel comparison sorting. 27th Annual Symposium on Foundations of Computer Science. :502-510.