PhD Alumni

Last First Year Dissertation Advisor
Mittal Anurag 2002 Surveillance under Severe Occlusions Larry Davis
Mitchell Elizabeth 1990 A competitive activation mechanism for semantic inference James Reggia
Mishra Arunesh 2005 Supporting Secure and Transparent Mobility in Wireless-Local-Area Networks William Arbaugh
Mirrashed Fatemeh 2013 Domain Adaptive Object Recognition and Detection Larry Davis
Mintz Doron 1991 Robustness by consensus Azriel Rosenfeld
Milton Leslie 2016 User Behavioral Modeling of Web-based Systems for Continuous User Authentication Atif Memon
Miller Andrew 2016 Provable Security for Cryptocurrencies Jonathan Katz
Miller Michael 1993 A view of one's past and other aspects of reasoned change in belief Don Perlis
Milgram David 1973 Web automata Azriel Rosenfeld
Micinski Kristopher 2017 Interaction-Based Privacy Policies for Mobile Apps Jeffrey Foster
Mestre Julian 2007 Primal-Dual Algorithms for Combinatorial Optimization Problems Samir Khuller
Mendonca Manoel 1997 An approach to improving existing measurement frameworks in software development organizations Victor Basili
Memarsadeghi Nargess 2007 Efficient Algorithms for Clustering and Interpolation of Large Spatial Data Sets David Mount
McSkimin James 1976 Techniques for Employing Semantic Information in Question-Answering Systems Jack Minker
McMaster Scott 2008 A Context-Sensitive Coverage Criterion for Test Suite Reduction Atif Memon
McFadden Frank 1993 Competitive learning and competitive activation in cortical map formation
McCann Justin 2012 Automating Performance Diagnosis in Networked Systems Michael Hicks
Matta Ibrahim 1995 Fast evaluation and dynamic control of integrated services networks A. Udaya Shankar
Matos Gilberto 1998 Analysis and applications of receptive safety properties in concurrent systems James Purtilo
Martinez Maria Vanina 2011 Contributions to Personalizable Knowledge Integration
Margalit Avraham 1989 Efficient image matching Azriel Rosenfeld
Mardziel Piotr 2015 Modeling, Quantifying, and Limiting Adversary Knowledge Michael Hicks
Manson Jeremy 2004 The Java Memory Model William Pugh
Maneewongvatana Songrit 2001 Nearest Neighbor Searching in High Dimensional Spaces David Mount
Malozemoff Alexis 2016 Efficient Secure Computation for Real-world Settings and Security Models Jonathan Katz
Malik Sana 2016 A Visual Analytics Approach to Comparing Cohorts of Event Sequences Ben Shneiderman
Malekian Azarakhsh 2009 Combinatorial Optimization and Electronic Commerce Samir Khuller
Makarios Selene 1992 Parallel Paradigms and Practices for Spatial Data Hanan Samet
Mah Matthew 2011 Time-Based Location Techniques Using Inexpensive, Unsynchronized Clocks in Wireless Networks Ashok Agrawala
Madnani Nitin 2010 The Circle of Meaning: From Translation to Paraphrasing and Back Bonnie Dorr
Ma Kin Keung 2011 Improving Program Testing and Understanding via Symbolic Execution
Luo Yuancheng 2014 Fast Numerical and Machine Learning Algorithms for Spatial Audio Reproduction Ramani Duraiswami
Lumezanu Cristian 2009 Using Internet Geometry to Improve End-End Communication Performance Neil Spring
Luke Sean 2000 Issues in Scaling Genetic Programming: Breeding Strategies, Tree Generation, and Code Bloat Hendler
Lowe George 1979 Heuristic approaches to the decomposition of sparse matrices Werner C. Rheinboldt
Lott Christopher 1996 Measurement-based feedback in a process-centered software engineering environment Victor Basili
Lotem Amnon 2000 GraphHTN: Combining Planning Graphs and HTN Planning Dana Nau
Lopez Adam 2008 Machine Translation by Pattern Matching Philip Resnik
Long Teng 2016 Collaborative Testing of Shared Software Components Alan Sussman
London Philip 1978 Dependency Networks as a Representation for Modeling in General Problem Solvers Rieger
London Benjamin 2015 On the Stability of Structured Prediction Lise Getoor
Lobo Jose 1990 Semantics for Normal Disjunctive Logic Programs Jack Minker
Liu Haiying 2003 Algorithms for Capturing Human Body Motion and Structure Ramalingam Chellappa
Liu Hong 1996 Automatic validation of multi-process communication protocols Raymond Miller
Liu Xu 2008 Computer Vision and Image Processing Techniques for Mobile Applications Larry Davis
Liu Bo 2012 Computational Metagenomics: Network, Classification and Assembly Mihai Pop
Liu Chang 2016 Trace Oblivious Program Execution
Ling Haibin 2006 Techniques for Image Retrieval: Deformation Insensitivity and Large Automatic Thumbnail Cropping David Jacobs, David Jacobs
Lin Zheng 1992 A Distributed Fair Polling Scheme Applied to Or-Parallel Logic Batabases Jack Minker
Lin Chih-Chen 1990 Coupling production systems and database systems :! homogeneous approach Timos Sellis