Publications

Export 336 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Title is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Krishnamurthy S, Chandrasekaran S, Cooper O, Deshpande A, Franklin MJ, Hellerstein JM, Hong W, Madden S, Reiss F, Shah MA.  2003.  TelegraphCQ: An architectural status report. IEEE Data Engineering Bulletin. 26(1):11-18.
Kolker R, Shneiderman B.  1996.  Tools for creating and exploiting content. Getty Art History Information Program (1996) Research Agenda for Networked Cultural Heritage, Santa Monica. CA: Getty AHIP. :27-30.
Kimes NE, Grim CJ, Johnson WR, Hasan NA, Tall BD, Kothary MH, Kiss H, Munk CA, Tapia R, Green L et al..  2011.  Temperature regulation of virulence factors in the pathogen Vibrio coralliilyticus. The ISME Journal. 6(4):835-846.
Kim Y-S, Dagalakis NG, Gupta SK.  2011.  A Two Degree of Freedom Nanopositioner With Electrothermal Actuator for Decoupled Motion. :447-457.
Kim J-S, Nam B, Keleher P, Marsh M, Bhattacharjee B, Sussman A.  2008.  Trade-offs in matching jobs and balancing load for distributed desktop grids. Future Generation Computer Systems. 24(5):415-424.
Khuller S, Malekian A, Mestre J.  2007.  To fill or not to fill: the gas station problem. Algorithms–ESA 2007. :534-545.
Khuller S, Mitchell JSB.  1990.  On a triangle counting problem. Information Processing Letters. 33(6):319-321.
Khalili A, Katz J, Arbaugh WA.  2003.  Toward secure key distribution in truly ad-hoc networks. Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on. :342-346.
Kerr DC, Goldsman N, Mayergoyz ID.  1998.  Three-Dimensional Hydrodynamic Modeling of MOSFET Devices. VLSI Design. 6(1-4):261-265.
Kembhavi A, Farrell R, Luo Y, Jacobs DW, Duraiswami R, Davis LS.  2008.  Tracking Down Under: Following the Satin Bowerbird. Applications of Computer Vision, 2008. WACV 2008. IEEE Workshop on. :1-7.
Kelly W, Pugh W, Rosser E, Shpeisman T.  1996.  Transitive closure of infinite graphs and its applications. Languages and Compilers for Parallel Computing. :126-140.
Keceli F, Tzannes A, Caragea GC, Barua R, Vishkin U.  2011.  Toolchain for Programming, Simulating and Studying the XMT Many-Core Architecture. Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. :1282-1291.
Katz J, MacKenzie P, Taban G, Gligor V.  2005.  Two-server password-only authenticated key exchange. Applied Cryptography and Network Security. :175-206.
Katz J, Yung M.  2002.  Threshold cryptosystems based on factoring. Advances in Cryptology—ASIACRYPT 2002. :139-147.
Katz J, MacKenzie P, Taban G, Gligor V.  2012.  Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.
Karlson AK, Bederson BB.  2007.  Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
Kang L, Doermann D.  2011.  Template based Segmentation of Touching Components in Handwritten Text Lines. 11th Intl. Conf. on Document Analysis and Recognition (ICDAR'11). :569-573.
Kale A, Chowdhury AKR, Chellappa R.  2003.  Towards a view invariant gait recognition algorithm. Proceedings. IEEE Conference on Advanced Video and Signal Based Surveillance, 2003.. :143-150.
J
Josyula DP, Anderson ML, Perlis D.  2003.  Towards domain-independent, task-oriented, conversational adequacy. INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL IN℡LIGENCE. 18:1637-1638.
Johnson B, Shneiderman B, Baker MJ, Eick SG.  1999.  TennisViewer: A Browser for Competition Trees. Readings in information visualization: using vision to think. :149-149.
Johnson B, Shneiderman B.  1993.  Treemaps. Sparks of innovation in human-computer interaction. 284:309-309.
Johnson B, Shneiderman B.  1991.  Tree-maps: a space-filling approach to the visualization of hierarchical information structures. , IEEE Conference on Visualization, 1991. Visualization '91, Proceedings. :284-291.
Zhuolin Jiang, Lin Z, Davis LS.  2010.  A tree-based approach to integrated action localization, recognition and segmentation. ECCV Workshops.
Zhuolin Jiang, Li S-F, Gao D-F.  2006.  A Time Saving Method for Human Detection in Wide Angle Camera Images. Machine Learning and Cybernetics, 2006 International Conference on. :4029-4034.
Jia X-P, Peng H, Zheng Q-L, Zhuolin Jiang, Li Z.  2008.  A topic-based Document Correlation Model. Machine Learning and Cybernetics, 2008 International Conference on. 5:2487-2491.

Pages