|
Luo |
Yuancheng |
2014 |
Fast Numerical and Machine
Learning Algorithms for Spatial Audio Reproduction |
Ramani Duraiswami |
|
Ma |
Kin Keung |
2011 |
Improving Program Testing and Understanding via Symbolic Execution |
Jeffrey Foster, Michael Hicks |
|
Ma |
Kin Keung |
2011 |
Improving Program Testing and Understanding via Symbolic Execution |
Jeffrey Foster, Michael Hicks |
|
Maddali |
Hanuma Teja |
2023 |
Design Considerations for Remote Expert Guidance Using Extended Reality in Skilled Hobby Settings |
Amanda Lazar |
|
Madnani |
Nitin |
2010 |
The Circle of Meaning: From Translation to
Paraphrasing and Back |
Bonnie Dorr |
|
Magen |
Assaf |
2019 |
Characterization Of Survival Associated Gene Interactions And Lymphocyte Heterogeneity In Cancer |
|
|
Mah |
Matthew |
2011 |
Time-Based Location Techniques Using Inexpensive,
Unsynchronized Clocks in Wireless Networks |
Ashok Agrawala |
|
Makarios |
Selene |
1992 |
Parallel Paradigms and Practices for Spatial Data |
Hanan Samet |
|
Malekian |
Azarakhsh |
2009 |
Combinatorial Optimization and Electronic Commerce |
Samir Khuller |
|
Malik |
Sana |
2016 |
A Visual Analytics Approach to Comparing Cohorts of Event Sequences |
Ben Shneiderman |
|
Malozemoff |
Alexis |
2016 |
Efficient Secure Computation for Real-world Settings and
Security Models |
Jonathan Katz |
|
Malu |
Meethu |
2018 |
Designing and Implementing Accessible Wearable Interactions for People with Motor Impairments |
|
|
Maneewongvatana |
Songrit |
2001 |
Nearest Neighbor Searching in High Dimensional Spaces |
David Mount |
|
Manjunatha |
Varun |
2019 |
Vision And Natural Language For Creative Applications, And Their Analysis |
Larry Davis |
|
Manson |
Jeremy |
2004 |
The Java Memory Model |
William Pugh |
|
Mardziel |
Piotr |
2015 |
Modeling, Quantifying, and Limiting Adversary
Knowledge |
Michael Hicks |
|
Margalit |
Avraham |
1989 |
Efficient image matching |
Azriel Rosenfeld |
|
Martinez |
Maria Vanina |
2011 |
Contributions to Personalizable Knowledge Integration |
V.S. Subrahmanian |
|
Mathur |
Puneet |
2023 |
Document Information Extraction, Structure Understanding And Manipulation |
Dinesh Manocha |
|
Matos |
Gilberto |
1998 |
Analysis and applications of receptive safety properties in concurrent systems |
James Purtilo |
|
Matta |
Ibrahim |
1995 |
Fast evaluation and dynamic control of integrated services networks |
A. Udaya Shankar |
|
Maynord |
Michael |
2024 |
Feedback For Vision |
John Aloimonos Cornelia Fermüller |
|
McCann |
Justin |
2012 |
Automating Performance Diagnosis in Networked Systems |
Michael Hicks |
|
McFadden |
Frank |
1993 |
Competitive learning and competitive activation in cortical map formation |
|
|
McMaster |
Scott |
2008 |
A Context-Sensitive Coverage Criterion for Test Suite
Reduction |
|
|
McSkimin |
James |
1976 |
Techniques for Employing Semantic Information in Question-Answering Systems |
|
|
Memarsadeghi |
Nargess |
2007 |
Efficient Algorithms for Clustering and Interpolation of Large Spatial Data Sets |
David Mount |
|
Memory |
Alexander |
2019 |
Collective Relational Data Integration with Diverse and Noisy Evidence |
Lise Getoor |
|
Mendonca |
Manoel |
1997 |
An approach to improving existing measurement frameworks in software development organizations |
Victor Basili |
|
Meng |
Xiaoxu |
2020 |
Enhancing Visual and Gestural Fidelity for Effective Virtual Environments |
Amitabh Varshney |
|
Meshry |
Moustafa Mahmoud |
2022 |
Neural Rendering Techniques for Photo-realistic Image Generation and Novel View Synthesis |
Abhinav Shrivastava, Larry Davis |
|
Meshry |
Moustafa Mahmoud |
2022 |
Neural Rendering Techniques for Photo-realistic Image Generation and Novel View Synthesis |
Abhinav Shrivastava, Larry Davis |
|
Mestre |
Julian |
2007 |
Primal-Dual Algorithms for Combinatorial Optimization Problems |
Samir Khuller |
|
Miao |
Hui |
2018 |
Provenance Management for Collaborative Data Science Workflows |
Amol Deshpande |
|
Micinski |
Kristopher |
2017 |
Interaction-Based Privacy Policies for Mobile Apps |
Jeffrey Foster |
|
Milgram |
David |
1973 |
Web automata |
Azriel Rosenfeld |
|
Miller |
Andrew |
2016 |
Provable Security for Cryptocurrencies |
Jonathan Katz |
|
Miller |
Michael |
1993 |
A view of one's past and other aspects of reasoned change in belief |
Don Perlis |
|
Milton |
Leslie |
2016 |
User Behavioral Modeling of Web-based
Systems for Continuous User Authentication |
|
|
Mintz |
Doron |
1991 |
Robustness by consensus |
Azriel Rosenfeld |
|
Mirrashed |
Fatemeh |
2013 |
Domain Adaptive Object Recognition and Detection |
Larry Davis |
|
Mishra |
Arunesh |
2005 |
Supporting Secure and Transparent Mobility in Wireless-Local-Area Networks |
William Arbaugh |
|
Mishra |
Shlok |
2024 |
Self Supervised Learning On Large Scale Datasets |
David Jacobs |
|
Mitchell |
Elizabeth |
1990 |
A competitive activation mechanism for semantic inference |
James Reggia |
|
Mitrokhin |
Anton |
2020 |
Motion Segmentation and Egomotion Estimation with Event-Based Cameras |
John Aloimonos |
|
Mittal |
Trisha |
2023 |
Towards Multimodal and Context-Aware Emotion Perception |
Dinesh Manocha |
|
Mittal |
Anurag |
2002 |
Surveillance under Severe Occlusions |
Larry Davis |
|
Mohr |
Jeffrey |
1980 |
On the characterization of computer systems' workloads |
Ashok Agrawala |
|
Mondal |
Jayanta |
2016 |
Real-Time Querying and Analytics on Large Dynamic
Graphs |
Amol Deshpande |
|
Monner |
Derek |
2011 |
A Neurocomputational Model of Grounded Language Comprehension
And Production at the Sentence Level |
James Reggia |