Publications

Export 336 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Title is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Papadimitriou P, Tsaparas P, Fuxman A, Getoor L.  2012.  TACI: Taxonomy-Aware Catalog Integration. IEEE Transactions on Knowledge and Data Engineering (TKDE).
O
Oriol M, Hicks MW.  2005.  Tagged Sets: A Secure and Transparent Coordination Medium. Coordination Models and LanguagesCoordination Models and Languages. 3454:193-205.
Olsen M, Traum D, Van Ess-Dykema C, Weinberg A, Dolan R.  2000.  Telicity as a cue to temporal and discourse structure in Chinese-English machine translation. :34-41.
Oard D, Ertunc F.  2002.  Translation-based indexing for cross-language retrieval. Advances in Information Retrieval. :425-447.
Oard D.  2004.  Transforming access to the spoken word. Proceedings of the International Symposium on Large-scale Knowledge Resources. :57-59.
N
North C, Shneiderman B.  1997.  A Taxonomy of Multiple Window Coordination. Institute for Systems Research Technical Reports.
Nirkhe M, Kraus S, Perlis D.  1995.  Thinking takes time: a modal active-logic for reasoning in time. Proc. of BISFAI-95.
Nguyen H V, Banerjee A, Chellappa R.  2010.  Tracking via object reflectance using a hyperspectral video camera. 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). :44-51.
Nguyen H V, Banerjee A, Burlina P, Broadwater J, Chellappa R.  2011.  Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.
Nguyen VA, Boyd-Graber J, Chang J, Resnik P.  Submitted.  Tree-based Label Dependency Topic Models. cs.umd.edu.
Naishlos D, Nuzman J, Tseng CW, Vishkin U.  2003.  Towards a first vertical prototyping of an extremely fine-grained parallel programming approach. Theory of Computing Systems. 36(5):521-552.
M
Mylopoulos J, Borgida A, Cohen P, Roussopoulos N, Tsotsos J, Wong H.  1976.  TORUS: A step towards bridging the gap between data bases and the casual user. Information Systems. 2(2):49-64.
Mylopoulos J, Borgida A, Cohen P, Roussopoulos N, Tsotsos J, Wong H.  1975.  TORUS-a natural language understanding system for data management. Proceedings of the Fourth International Conference on Artificial Intelligence. :414-421.
Mundur P, Sood A, Simon R.  1998.  Threshold-based admission control for multi-class video-on-demand systems. Performance, Computing and Communications, 1998. IPCCC '98., IEEE International. :154-160.
Motiwala M, Dhamdhere A, Feamster N, Lakhina A.  2012.  Towards a cost model for network traffic. SIGCOMM Comput. Commun. Rev.. 42(1):54-60.
Morselli R, Bhattacharjee B, Katz J, Keleher P.  2004.  Trust-preserving set operations. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2231-2241vol.4-2231-2241vol.4.
Montemayor J, Druin A, Chipman G, Farber A, Guha ML.  2004.  Tools for children to create physical interactive storyrooms. Computers in Entertainment (CIE). 2(1):12-12.
Miller M, Perlis D.  1991.  Typicality constants and range defaults: Some pros and cons of a cognitive model of default reasoning. Methodologies for Intelligent Systems. :560-569.
Memon AM.  2009.  TESTING EVENT-DRIVEN SOFTWARE–THE NEXT QA CHALLENGE? Software Engineering and DevelopmentSoftware Engineering and Development. :187-187.
Martin, M.P, Weirs G, Candler GV, Piomelli U, Johnson H, Nompelis I.  2000.  Toward the large-eddy simulation over a hypersonic elliptical cross-section cone. AIAA Paper No. 00-2311.
Martin, M.P, Smits A, Wu M, Ringuette M.  2006.  The turbulence structure of shockwave and boundary layer interaction in a compression corner. 44th AIAA Aerospace Meeting and Exhibit. 2006
Marchionini G, Haas S, Plaisant C, Shneiderman B, Hert C.  2003.  Toward a statistical knowledge network. Proceedings of the 2003 annual national conference on Digital government research. :1-6.
Marchionini G, Haas S, Plaisant C, Shneiderman B, Hert C.  2005.  Toward a Statistical Knowledge Network (2004). Institute for Systems Research Technical Reports.
Mao Y, Wu M.  2007.  Tracing malicious relays in cooperative wireless communications. Information Forensics and Security, IEEE Transactions on. 2(2):198-212.
Mansour Y, Nisan N, Vishkin U.  1999.  Trade-offs between communication throughput and parallel time. Journal of Complexity. 15(1):148-166.

Pages