Gordon |
Samuel |
2010 |
Fairness in Secure Computation |
Jonathan Katz |
Tas |
Nazif |
2010 |
Link Adaptation in Wireless Networks: A
Cross-Layer Approach |
Ashok Agrawala |
Brooks |
Penelope |
2009 |
Defining and Evaluating Test Suite Consolidation for Event-Sequence-Based Test Cases |
|
Lapizco Encinas |
Grecia |
2009 |
Cooperative Particle Swarm Optimization for Combinatorial Problems |
James Reggia |
Sen |
Prithviraj |
2009 |
Representing and Querying Uncertain Data |
Lise Getoor |
Shin |
Ji Sun |
2009 |
Enhancing Privacy in Cryptographic Protocols |
Virgil Gligor |
Strecker |
Jaymie |
2009 |
Accounting for Defect Characteristics in Emprical Studies of Software Testing |
|
Fails |
Jerry |
2009 |
Mobile Collaboration for Young Children |
Allison Druin |
Wu |
Yao |
2009 |
Computing Customized Ranking |
Louiqa Raschid |
Lumezanu |
Cristian |
2009 |
Using Internet Geometry to Improve End-End Communication Performance |
|
Furr |
Michael |
2009 |
Combining Static and Dynamic Typing in Ruby |
Jeffrey Foster |
Kim |
Jik-Soo |
2009 |
Decentralized and Scalable Resource Management for Desktop Grids |
Alan Sussman |
Gupta |
Abnihav |
2009 |
Beyond Nouns and Verbs |
Larry Davis |
Lee |
Woei-Jyh |
2009 |
A Framework for Discovering Meaningful Associations in the Annotated Life Sciences Web |
Louiqa Raschid |
El-Alfy |
Hazem |
2009 |
Techniques for Video Surveillance: Automatic
Video Editing and Target Tracking |
Larry Davis |
Malekian |
Azarakhsh |
2009 |
Combinatorial Optimization and Electronic Commerce |
Samir Khuller |
Elsayed |
Tamer |
2009 |
Identity Resolution in Email Collections |
Doug Oard |
Hussein |
Mohamed |
2009 |
Algorithmic Issues in Visual Object Recognition |
|
Domke |
Justin |
2009 |
Tractable Learning and Inference in High Treewidth
Graphical Models |
John Aloimonos |
Jung |
Jin Hyuk |
2008 |
Adaptive Constraint Reduction for Convex Quadratic
Programming and Training Support Vector Machine |
Dianne O'Leary |
Kolovski |
Vladimir |
2008 |
Analyzing Web Access Control Policies using Description Logics |
Hendler |
Lopez |
Adam |
2008 |
Machine Translation by Pattern Matching |
Philip Resnik |
Liao |
Chunyuan |
2008 |
"PapierCraft": A New Paper-Based
Interface to Support Interaction with Digital Documents |
François Guimbretière |
Udrea |
Octavian |
2008 |
Scalable Ontology Systems |
V.S. Subrahmanian |
Aggarwal |
Gaurav |
2008 |
Recognizing Human Faces: Physical Modeling and Pattern
Classification |
|
Wu |
Xue |
2008 |
Improving the Performance and Precision of
Bioinformatics Algorithms |
Chau-Wen Tseng |
McMaster |
Scott |
2008 |
A Context-Sensitive Coverage Criterion for Test Suite
Reduction |
|
Aris |
Aleks |
2008 |
Visualizing and Exploring Networks Using Semantic Substrates |
Ben Shneiderman |
Kim |
Youngmin |
2008 |
Saliency-Guided Graphics and Visualization |
Amitabh Varshney |
Neamtiu |
Iulian |
2008 |
Practical Dynamic Software Updating |
Michael Hicks |
Parker |
Austin |
2008 |
Spatial Probabilistic Temporal Databases |
Dana NauV.S. Subrahmanian |
Wu |
Shang-Chieh |
2008 |
Flexible and Efficient Control of Data Transfers for Loosely Coupled Components |
Alan Sussman |
Kim |
Youngmin |
2008 |
Saliency-Guided Graphics and Visualization |
Amitabh Varshney |
Pratikakis |
Polyvios |
2008 |
Sound, Precise and Efficient Static Race Detection for
Multi-Threaded Programs |
Michael Hicks, Jeffrey Foster |
Sankaranarayanan |
Jagan |
2008 |
Scalable Query Processing on Spatial Network |
Hanan Samet |
Pratikakis |
Polyvios |
2008 |
Sound, Precise and Efficient Static Race Detection for
Multi-Threaded Programs |
Michael Hicks, Jeffrey Foster |
Tran |
Son |
2008 |
Robust Techniques for Visual Surveillance |
Larry Davis |
Hui |
Annie |
2008 |
Representing and Understanding Non-Manifold Objects |
Leila De Floriani |
Sheorey |
Sameer |
2008 |
Recognition and Matching in the Presence of Deformation and Lighting Change |
David Jacobs |
Swamy |
Nikhil |
2008 |
Language-Based Enforcement of User-Defined Security Policies As Applied to Multi-tier Web Programs |
Michael Hicks |
Vasan |
Arunchandar |
2008 |
Timestepped Stochastic Simulation of 802.11 WLANS |
A. Udaya Shankar |
Yuan |
Xun |
2008 |
Feedback-Directed Model-Based GUI Test Case Generation |
|
Au |
Tsz-Chiu |
2008 |
Synthesis of Strategies for Non-Zero-Sum Repeated Games |
Dana Nau |
Liu |
Xu |
2008 |
Computer Vision and Image Processing Techniques for Mobile Applications |
Larry Davis |
Sherwood |
Robert |
2008 |
Discovering and Securing Shared Resources on the
Internet |
Bobby Bhattacharjee |
Tahmoush |
David |
2008 |
Similarity Classification and Retrieval in
Cancer Images and
Informatics |
Hanan Samet |
Perer |
Adam |
2008 |
Integrating Statistics and Visualization to
Improve Exploratory Social Network Analysis |
Ben Shneiderman |
Andersen |
Carl |
2008 |
Using Join Networks to Compute Satisfiability |
William Gasarch |
Petroni |
Nick |
2007 |
Property-Based Integrity Monitoring of Operating System Kernels |
William Arbaugh, Michael Hicks |
Horvitz |
David Omer |
2007 |
Expressiveness of Definitions and Efficiency of Constructions in Computational Cryptography |
Virgil Gligor |