Morgenthaler |
David |
1981 |
Three-dimensional digital image processing |
Azriel Rosenfeld |
Morell |
Larry |
1983 |
A theory of error-based testing |
Richard G. Hamlet |
Morariu |
Vlad |
2010 |
Analyzing Structured Scenarios by Tracking
People and Their Limbs |
Larry Davis |
Moon |
Bongki |
1996 |
Data placement for high performance spatio-temporal databases |
Joel Saltz |
Moon |
Soo-Mook |
1993 |
Compile-time Parallelization of Non-numerical Code VLIW and Superscalar |
Ashok Agrawala |
Montemayor |
Jaime |
2003 |
Physical Programming |
Hendler |
Monroe |
Megan |
2014 |
Interactive Event Sequence Query and Transformation |
Ben Shneiderman |
Monner |
Derek |
2011 |
A Neurocomputational Model of Grounded Language Comprehension
And Production at the Sentence Level |
James Reggia |
Mondal |
Jayanta |
2016 |
Real-Time Querying and Analytics on Large Dynamic
Graphs |
Amol Deshpande |
Mohr |
Jeffrey |
1980 |
On the characterization of computer systems' workloads |
Ashok Agrawala |
Mittal |
Trisha |
2023 |
Towards Multimodal and Context-Aware Emotion Perception |
Dinesh Manocha |
Mittal |
Anurag |
2002 |
Surveillance under Severe Occlusions |
Larry Davis |
Mitrokhin |
Anton |
2020 |
Motion Segmentation and Egomotion Estimation with Event-Based Cameras |
John Aloimonos |
Mitchell |
Elizabeth |
1990 |
A competitive activation mechanism for semantic inference |
James Reggia |
Mishra |
Shlok |
2024 |
Self Supervised Learning On Large Scale Datasets |
David Jacobs |
Mishra |
Arunesh |
2005 |
Supporting Secure and Transparent Mobility in Wireless-Local-Area Networks |
William Arbaugh |
Mirrashed |
Fatemeh |
2013 |
Domain Adaptive Object Recognition and Detection |
Larry Davis |
Mintz |
Doron |
1991 |
Robustness by consensus |
Azriel Rosenfeld |
Milton |
Leslie |
2016 |
User Behavioral Modeling of Web-based
Systems for Continuous User Authentication |
|
Miller |
Andrew |
2016 |
Provable Security for Cryptocurrencies |
Jonathan Katz |
Miller |
Michael |
1993 |
A view of one's past and other aspects of reasoned change in belief |
Don Perlis |
Milgram |
David |
1973 |
Web automata |
Azriel Rosenfeld |
Micinski |
Kristopher |
2017 |
Interaction-Based Privacy Policies for Mobile Apps |
Jeffrey Foster |
Miao |
Hui |
2018 |
Provenance Management for Collaborative Data Science Workflows |
Amol Deshpande |
Mestre |
Julian |
2007 |
Primal-Dual Algorithms for Combinatorial Optimization Problems |
Samir Khuller |
Meshry |
Moustafa Mahmoud |
2022 |
Neural Rendering Techniques for Photo-realistic Image Generation and Novel View Synthesis |
Abhinav Shrivastava, Larry Davis |
Meshry |
Moustafa Mahmoud |
2022 |
Neural Rendering Techniques for Photo-realistic Image Generation and Novel View Synthesis |
Abhinav Shrivastava, Larry Davis |
Meng |
Xiaoxu |
2020 |
Enhancing Visual and Gestural Fidelity for Effective Virtual Environments |
Amitabh Varshney |
Mendonca |
Manoel |
1997 |
An approach to improving existing measurement frameworks in software development organizations |
Victor Basili |
Memory |
Alexander |
2019 |
Collective Relational Data Integration with Diverse and Noisy Evidence |
Lise Getoor |
Memarsadeghi |
Nargess |
2007 |
Efficient Algorithms for Clustering and Interpolation of Large Spatial Data Sets |
David Mount |
McSkimin |
James |
1976 |
Techniques for Employing Semantic Information in Question-Answering Systems |
|
McMaster |
Scott |
2008 |
A Context-Sensitive Coverage Criterion for Test Suite
Reduction |
|
McFadden |
Frank |
1993 |
Competitive learning and competitive activation in cortical map formation |
|
McCann |
Justin |
2012 |
Automating Performance Diagnosis in Networked Systems |
Michael Hicks |
Maynord |
Michael |
2024 |
Feedback For Vision |
John Aloimonos Cornelia Fermüller |
Matta |
Ibrahim |
1995 |
Fast evaluation and dynamic control of integrated services networks |
A. Udaya Shankar |
Matos |
Gilberto |
1998 |
Analysis and applications of receptive safety properties in concurrent systems |
James Purtilo |
Mathur |
Puneet |
2023 |
Document Information Extraction, Structure Understanding And Manipulation |
Dinesh Manocha |
Martinez |
Maria Vanina |
2011 |
Contributions to Personalizable Knowledge Integration |
V.S. Subrahmanian |
Margalit |
Avraham |
1989 |
Efficient image matching |
Azriel Rosenfeld |
Mardziel |
Piotr |
2015 |
Modeling, Quantifying, and Limiting Adversary
Knowledge |
Michael Hicks |
Manson |
Jeremy |
2004 |
The Java Memory Model |
William Pugh |
Manjunatha |
Varun |
2019 |
Vision And Natural Language For Creative Applications, And Their Analysis |
Larry Davis |
Maneewongvatana |
Songrit |
2001 |
Nearest Neighbor Searching in High Dimensional Spaces |
David Mount |
Malu |
Meethu |
2018 |
Designing and Implementing Accessible Wearable Interactions for People with Motor Impairments |
|
Malozemoff |
Alexis |
2016 |
Efficient Secure Computation for Real-world Settings and
Security Models |
Jonathan Katz |
Malik |
Sana |
2016 |
A Visual Analytics Approach to Comparing Cohorts of Event Sequences |
Ben Shneiderman |
Malekian |
Azarakhsh |
2009 |
Combinatorial Optimization and Electronic Commerce |
Samir Khuller |
Makarios |
Selene |
1992 |
Parallel Paradigms and Practices for Spatial Data |
Hanan Samet |