Lentz |
Matthew |
2020 |
Assurance and Control over Sensitive Data on Personal Devices |
Bobby Bhattacharjee |
Lemmer |
John |
1976 |
Algorithms for incompletely specified distributions in a generalized graph model for medical diagnosis |
|
Lemkin |
Peter |
1978 |
Bone marrow smear image analysis |
Azriel Rosenfeld |
Lekakis |
Vasileios |
2018 |
Decoupling Consistency Determination and Trust from Underlying Distributed Data Stores |
Pete Keleher |
Lee |
Kyungjun |
2022 |
Egocentric Vision in Assistive Technologies For and By the Blind |
Hernisa Kacorri |
Lee |
Kookjin |
2017 |
Fast and Optimal Solution Algorithms for Parameterized Partial Differential Equations |
Howard Elman |
Lee |
Youndo |
2017 |
Improving Accuracy and Efficiency of Network Measurement by Identifying Homogeneous IPV4 Addresses |
|
Lee |
Sung |
1998 |
A Study of Cyclone Technology |
Ashok Agrawala |
Lee |
Chang |
2005 |
Perceptual Graphics for Effective Visualization |
Amitabh Varshney |
Lee |
Bongshin |
2006 |
Interactive Visualizations for Trees and Graphs |
Ben Bederson |
Lee |
Michael |
2006 |
Spatial Modeling Using Triangular, Tetrahedral, and Pentatopic Decompositions |
Hanan Samet |
Lee |
Seungjoon |
2006 |
WISE Abstraction Framework for Wireless Networks |
Bobby Bhattacharjee |
Lee |
Chia-Hoang |
1983 |
The use of shading in image segmentation and surface orientation estimation |
Azriel Rosenfeld |
Lee |
Che-Rung |
2006 |
Residual Arnoldi Methods: Theory, Package, ind Experiments |
G.W. (Pete) Stewart |
Lee |
Tak Yeon |
2017 |
Toward Symbiotic Human-AI Interaction Focusing On
Programming By Example |
Ben Bederson |
Lee |
Woei-Jyh |
2009 |
A Framework for Discovering Meaningful Associations in the Annotated Life Sciences Web |
Louiqa Raschid |
Lee |
Jaehwan |
2012 |
Decentralized Resource Orchestration for Heterogeneous Grids |
Alan Sussman |
Larsen |
Ronald |
1981 |
Control of Multiple Exponential Servers with Applications to Computer Systems |
Ashok Agrawala |
Lapizco Encinas |
Grecia |
2009 |
Cooperative Particle Swarm Optimization for Combinatorial Problems |
James Reggia |
Langmead |
Benjamin |
2012 |
Algorithms and High Performance Computing Approaches for
Sequencing-Based Comparative Genomics |
Steven Salzberg |
Lan |
Shiyi |
2022 |
Object Detection and Instance Segmentation for Real-world Applications |
Larry Davis |
Lampton |
James |
2015 |
Pig Squeal: Bridging Batch and Streaming
Processing Using
Incremental Updates |
Ashok Agrawala |
Lam |
Michael |
2014 |
Automated Floating-Point Precision Analysis |
Jeffrey K. Hollingsworth |
Lakshman |
T.V. |
1986 |
Message-Complexity vs. Delay Tradeoffs in Decentralized Consensus Protocols |
Ashok Agrawala |
Lakshman |
Tirunella |
1986 |
Message-Complexity vs. Delay Tradeoffs in Decentralized Consensus Protocols |
Ashok Agrawala |
Labrinidis |
Alexandros |
2002 |
Online View Selection for the Web |
Nicholas Roussopoulos |
Kuter |
Uger |
2006 |
Planning Under Uncertainty: Moving Forward |
Dana Nau |
Kushner |
Todd |
1982 |
A theoretical model of interprocessor communication for parallel image processing |
Azriel Rosenfeld |
Kumaresan |
Ranjit |
2012 |
Broadcast and Verifiable Secret Sharing: New Security Models and Round
Optimal Constructions |
Jonathan Katz |
Kumar |
Vipin |
1982 |
A unified approach to problem solving search procedures |
|
Kumar |
Abhishek |
2013 |
Learning with Multiple Similarities |
Hal Daumé III |
Kumar |
Aounon |
2023 |
Extending The Scope Of Provable Adversarial Robustness In Machine Learning |
Soheil Feizi, Tom Goldstein |
Kumar |
Aounon |
2023 |
Extending The Scope Of Provable Adversarial Robustness In Machine Learning |
Soheil Feizi, Tom Goldstein |
Kumar |
Srijan |
2017 |
Characterization and Detection of Malicious Behavior on the Web |
V.S. Subrahmanian |
Kumar |
Jayant |
2013 |
Efficient Machine Learning Methods for Document Image Analysis |
Larry Davis |
Kulkarni |
Ashok |
1976 |
Optional and heuristic synthesis of hierarchical classifiers |
|
Kules |
William |
2006 |
Supporting Exploratory Search with Meaningful and Stable Categorized Overviews |
Ben Shneiderman |
Kuijt |
David |
2001 |
An Object-Oriented Approach to Parallel Spatial Indexing of Vector-Format Polygons |
Hanan Samet |
Krishnamoorthy |
Shivsubramani |
2013 |
Rover – II: A Context-Aware Middleware for Pervasive
Computing Environment |
Ashok Agrawala |
Kotidis |
Ioannis |
2000 |
A Framework for Mangament and Efficient Maintenance of Materialized Data Warehouse Aggregates |
Nicholas Roussopoulos |
Korpeoglu |
Ibrahim |
2000 |
Mobile and wireless networking for palmtop and laptop computers |
Satish Kumar Tripathi |
Korn |
Philip |
1998 |
Indexing and Mining Medical Image and Multimedia Databases |
Christos Faloutsos |
Koren |
Sergey |
2012 |
Genome Assembly: Novel Applications by Harnessing Emerging Sequencing Technologies and Graph Algorithms |
Mihai Pop |
Koo |
Chiu Yuen |
2007 |
Studies on Fault-Tolerant Broadcast and Secure
Computation |
Jonathan Katz |
Kong |
Kezhi |
2024 |
Towards Generalized And Scalable Machine Learning On Structured Data |
Tom Goldstein |
Kolovski |
Vladimir |
2008 |
Analyzing Web Access Control Policies using Description Logics |
Hendler |
Kolak |
Okan |
2005 |
Cross-Lingual Utilization of NLP Resources for New Languages |
Philip Resnik |
Kohout |
Robert |
1998 |
Guaranteeing safety in the presence of moving obstacles |
Hendler |
Kohli |
Madhur |
1987 |
Controlling the Execution of Logic Programs |
|
Kochut |
Andrzej |
2005 |
Timestep Stochastic Sinulation of Computer Networks Using Diffusion Approximation |
A. Udaya Shankar |