Sweet |
Ian Nicholas |
2022 |
Language-Based Techniques for Secure Programming |
Michael Hicks |
McCann |
Justin |
2012 |
Automating Performance Diagnosis in Networked Systems |
Michael Hicks |
Hayden |
Christopher |
2012 |
Clear, Correct, and Efficient Dynamic Software Updates |
Michael Hicks, Jeffrey Foster |
Neamtiu |
Iulian |
2008 |
Practical Dynamic Software Updating |
Michael Hicks |
Ma |
Kin Keung |
2011 |
Improving Program Testing and Understanding via Symbolic Execution |
Jeffrey Foster, Michael Hicks |
Pratikakis |
Polyvios |
2008 |
Sound, Precise and Efficient Static Race Detection for
Multi-Threaded Programs |
Michael Hicks, Jeffrey Foster |
Liu |
Chang |
2016 |
Trace Oblivious Program Execution |
Michael HicksElaine Shi |
Parker |
James |
2020 |
Advanced Language-based Techniques for Correct, Secure Networked Systems |
Michael Hicks |
Hietala |
Kesha |
2022 |
A Verified Software Toolchain for Quantum Programming |
Michael Hicks |
Swamy |
Nikhil |
2008 |
Language-Based Enforcement of User-Defined Security Policies As Applied to Multi-tier Web Programs |
Michael Hicks |
Mardziel |
Piotr |
2015 |
Modeling, Quantifying, and Limiting Adversary
Knowledge |
Michael Hicks |
Rastogi |
Aseem |
2016 |
Language-Based Techniques for Practical and
Trustworthy Secure Multi-
Party Computations |
Michael Hicks |
Ryu |
Kyungdong |
2001 |
Using Idle Resources from Networks of Workstations |
Jeffrey K. Hollingsworth |
Stoker |
Geoffrey |
2014 |
Analyzing the Combined Effects of Measurement
Error and Perturbation
Error on Performance Announcement |
Jeffrey K. Hollingsworth |
Buck |
Bryan |
2004 |
Data Centric Cache Measurement Using Hardware and Software Instrumentation |
Jeffrey K. Hollingsworth |
Lam |
Michael |
2014 |
Automated Floating-Point Precision Analysis |
Jeffrey K. Hollingsworth |
Kang |
Dong-In |
1999 |
Automated design techniques for distributed real-time embedded systems |
Jeffrey K. Hollingsworth |
Tikir |
Mustafa |
2005 |
Using Hardware Monitors to Automatically Improve Memory Performance |
Jeffrey K. Hollingsworth |
Tiwari |
Ananta |
2011 |
Turning Parallel Applications in Parallel |
Jeffrey K. Hollingsworth |
Chung |
I-Hsin |
2004 |
Towards Automatic Performance Tuning |
Jeffrey K. Hollingsworth |
Williams |
Chadd |
2006 |
Using Historical Data from Source Code Revision Histories to Detect Source Code Properties |
Jeffrey K. Hollingsworth |
Ince |
Tugrul |
2013 |
Compilation and Binary Editing for Performance and Security |
Jeffrey K. Hollingsworth |
Rutar |
Nickolas |
2011 |
Foo's to Blame: Techniques for Mapping Performance
Data to Program Variables |
Jeffrey K. Hollingsworth |
Ryu |
Kwan |
1990 |
Efficient parallel algorithms on the network model |
|
Kanazawa (Kim) |
Angjoo |
2017 |
Single-View 3D Reconstruction of Animals |
David Jacobs |
Yadav |
Abhay Kumar |
2022 |
IMPROVED TRAINING OF DEEP NETWORKS FOR COMPUTER VISION |
David Jacobs |
Biswas |
Arijit |
2014 |
Semi-Supervised and Active Image Clustering with Pairwise
Constraints from Humans |
David Jacobs |
Sharma |
Abhishek |
2015 |
Learning from Multiple Views of Data |
David Jacobs |
Kang |
Seokbin |
2020 |
AUGMENTED REALITY SYSTEMS AND USER INTERACTION TECHNIQUES FOR STEM LEARNING |
David Jacobs |
Soares |
Joao |
2015 |
Efficient Image Segmentation and
Segment-Based Analysis in Computer Vision Applications |
David Jacobs |
Chen |
Daozheng |
2013 |
Resource Allocation in Computer Vision |
David Jacobs |
Sheorey |
Sameer |
2008 |
Recognition and Matching in the Presence of Deformation and Lighting Change |
David Jacobs |
Jain |
Rajiv |
2015 |
Searching Heterogeneous Document Image
Collections |
David Jacobs |
Ling |
Haibin |
2006 |
Techniques for Image Retrieval: Deformation Insensitivity and Large Automatic Thumbnail Cropping |
David JacobsDavid Jacobs |
Castillo |
Carlos |
2012 |
Dense Wide-Baseline Stereo Matching and its Application to Face Recognition |
David Jacobs |
Sun |
Jin |
2018 |
Finding Objects in Complex Scenes |
David Jacobs |
Stockman |
George |
1977 |
A problem-reduction approach to the linguistic analysis of waveforms |
Laveen Kanal |
Underwood |
William |
1979 |
|
Laveen Kanal |
Huang |
Yuangeng |
1990 |
Dynamic scheduling problem solving |
Laveen Kanal |
Bhatnagar |
Raj |
1989 |
Construction of preferred causal hypotheses for reasoning with uncertain knowledge |
Laveen Kanal |
Gupta |
Naresh |
1993 |
Recovering shape and motion from a sequence of images |
Laveen Kanal |
Hellstrom |
Benjamin |
1990 |
Thermodynamic neural networks for the approximation of combinatorially hard packing problems |
Laveen Kanal |
Kulkarni |
Ashok |
1976 |
Optional and heuristic synthesis of hierarchical classifiers |
Laveen Kanal |
Kumar |
Vipin |
1982 |
A unified approach to problem solving search procedures |
Laveen Kanal |
Gopalakrishnan |
Ponani |
1986 |
Parellel Approximate Algorithms for Combinatorialy Hard Problems |
Laveen Kanal |
Lemmer |
John |
1976 |
Algorithms for incompletely specified distributions in a generalized graph model for medical diagnosis |
Laveen Kanal |
Gordon |
Samuel |
2010 |
Fairness in Secure Computation |
Jonathan Katz |
Blum |
Erica |
2023 |
RESILIENT AND EFFICIENT CONSENSUS UNDER UNKNOWN NETWORK CONDITIONS |
Jonathan Katz |
Yerukhimovich |
Arkady |
2011 |
A Study of Separations in Cryptography:
New Results and New Models |
Jonathan Katz |
Apon |
Daniel |
2017 |
Frontiers In Lattice Cryptography And Program Obfuscation |
Jonathan Katz |